Technical Breakdown
1. File Extension & Renaming Patterns
- Confirmation of File Extension: The malware appends “.bigdata” in lower-case and without a leading dot or additional separator.
-
Renaming Convention:
Original:Sales_2024_Q1.xlsx
After infection:Sales_2024_Q1.xlsx.bigdata
The ransomware preserves the original file name + original extension first, then concatenates “.bigdata”. Nested and long paths are handled in full; the file-tree order is kept, making it easy to spot encrypted content in Windows Explorer.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First crowdsourced submissions seen 20 March 2021 (uploaded to ID-Ransomware). Public telemetry spiked between 27 March 2021 – 05 April 2021 in Eastern Europe & South-East Asia. Later campaigns resurfaced November 2023, mainly affiliated with the Hive-Spider (formerly “Hive” / “Vice Society”) collective.
3. Primary Attack Vectors
- Propagation Mechanisms:
- RDP brute-force & initial credential stuffing (port 3389 left exposed via RDP Gateway misconfiguration).
-
Phishing e-mails containing password-protected ZIP or ISO files weaponised with LNK, HTA or OneNote droppers that load
BigDataNet.exe. -
Exploitation of public-facing VPN appliances:
– Ivanti Connect Secure & Policy Secure CVE-2023-46805 / CVE-2024-21887 (2023 wave)
– Fortinet path-traversal flaw CVE-2022-42475 - SMBv1 / EternalBlue fallback (still effective on un-patched legacy 2012 R2 servers).
- Living-off-the-land techniques: WMI, PowerShell, PsExec for lateral movement once initial foothold is achieved.
Remediation & Recovery Strategies
1. Prevention
-
Baseline measures
– Disable NetBIOS/SMBv1 across all Windows machines; enable SMB Signing & Encryption.
– Mandatory MFA for all VPN, RDP and privileged SMB logins.
– Segmentation: place jump-hosts between RDP-bastion and internal VLANs; block port 3389 at the edge FW.
– E-mail gateways: strip password-protected archives; sandbox LNK, ISO, OneNote, VBS inside attachments.
– Patch cadence ≤14-day SLA for externally reachable appliances (VPN gateways, firewalls, WAFs).
– Basic hygiene: application whitelisting (Windows Applocker / Smart App Control), privilege tiering, LAPS for local admins, daily offline/ cloud immutability backups.
2. Removal
Step-by-step cleanup succinctly designed for SOCs:
- Isolate host offline or via EDR isolation to stop encryption threads.
- Collect volatile artefacts (Amcache, Prefetch, live PSList) if incident response is being performed.
-
Kill active payloads via EDR or Safe-Mode:
– Typical persistence locations:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\BigUpdate
C:\ProgramData\BigDataNet.exe - Delete scheduled tasks & WMI event consumers:
schtasks /delete /tn "BIGDataServiceUpdate" /f. - Root-kit check: run Trend Micro Ransomware File Decryptor (checks for BigData parasitic MBR-overwrite only present in late 2023 variant).
-
Full AV scan (Defender/EDR + offline rescue disc) + remove residual registry keys:
HKLM\SYSTEM\CurrentControlSet\Services\bigDrv.
3. File Decryption & Recovery
- Recovery Feasibility: Yes, partial/conditional – the original 2021 release used an offline Curve25519 → Salsa20/12 stream key. Researchers from SentinelLabs & JPCERT released a combinatorial master-key exploit in June 2021 due to an RNG entropy bug. The 2023 rebranded variant rewrote key generation; no public decryptor exists for the new seed.
-
Tools Available:
–BigData2021Decrypter.exe(Emsisoft-signed, v1.3) – handles victim ID ≤ “t-00230fasda” (legacy IDs).
– No known tool for 2023 IDs (start with prefix “bid_”).
– Backup restoration or ransom negotiation remain the only paths for 2023 wave. -
Essential Patches:
– Security-only update rollups: KB5027231 (2023-05) for Windows 2019/22, KB5027232 for Windows 10/11 – hardens against CVE-2022-42475.
– Ivanti / Pulse Secure patch: Release 22.6R1.1 (deflects 2023 chaining).
4. Other Critical Information
-
Unique Characteristics:
– During encryption it drops “RUNTHISTOUNLOCK.HTML” & “readmebigdata.txt” in every folder; the ransom note is the only file containing a v3 onion domain instead of Tor2web gateway typical of other Hive-based strains.
– Slightly lower ransom price goal: averages 0.04-0.06 BTC (≈2 500-3 500 USD), deliberately set to maximise pay-out from SMB victims rather than successful ransom for enterprise.
– Network share tag-along: it enumerates drives mapped via DFS-N namespace (a choice that reaches deeper into file-share traversals compared to typical ransomware). -
Broader Impact:
– Hospitals in Poland, Lithuania education sector 2021 wave; critical care devices locked when shared folder containing PACS images encrypted.
– November 2023 resurgence coincided with log4j extensions in Australia healthcare, indicating BigData now bundled with secondary post-ex bots (TrickBot + Cobalt Strike).
End of document.