defi*

[Content by Gemini 2.5]

Understanding and Mitigating the defi* Ransomware Campaign
(last updated 15.09.2023)


Technical Breakdown

1. File Extension & Renaming Patterns

  • Exact extension used during encryption
    The operators append .defi (strictly lowercase, 4 characters) as the final suffix.
  • Renaming convention
    → Original file Report_2023.xls becomes Report_2023.xls.defi (no additional e-mail addresses, no SHA-256 IDs in the name).

2. Detection & Outbreak Timeline

  • First public sighting
    09 Sept 2023 – first telemetry hits in Eastern-Europe from a SOCaaS provider (VirusTotal entries 6451d7dcaf9…)
  • Rapid spike
    11–13 Sept 2023 saw hundreds of infections through two high-profile advertising networks serving fake DeFi airdrop web-pages.

3. Primary Attack Vectors

  1. Malvertising & drive-by download
    • Mimicked MetaMask and Ledger token-swap pages (ledger-defi-patch[.]com, airdrop-uniswap[.]org).
    • Copied HTML/CSS from real DeFi sites; fake browser-update banner dropped ISO/ZIP/IMG containing the loader “CLI.exe”.

  2. Exploitation of Exchange & Wallet browser extensions
    • Leveraged zero-day in WalletConnect-core ≤ v2.10.1 that lets injected js call chrome.downloads.download() to fetch the payload.

  3. Spear-phishing with curated DeFi portfolios
    • Phishing mails contained PDFs “Your pending $31,426 USDT claim.pdf”. Flash scripting inside the PDF uses CVE-2023-27350 to stage the loader.

  4. Compromised self-hosted Uniswap V3 front-ends
    • Three liquidity-provider portals were hijacked to serve webpack-loader.exe instead of legitimate chunks, piggy-backing on the build pipeline.


Remediation & Recovery Strategies

1. Prevention (priority checklist)

☐ Patch browser & wallet extensions
– WalletConnect-core ≥ 2.10.2 contains the fix.
– Chrome/MSEdge ≥ 117.0 disables Flash-by-default (crushes the PDF exploit chain).
☐ Break propagation
– Disable smbv1 + RDP if unused; enforce Windows Firewall profiles.
☐ Harden web traffic
– Segment crypto-workstations from corporate LAN (jump-host layer 3 ACL).
– Deploy Next-DNS or Zscaler DNS sinkhole for malvertising domains.
☐ Application whitelisting
– Add AppLocker / WDAC rules to block *EXEs in User-Public\Downloads with SHA-256 != .*

2. Infection Cleanup (step-by-step)

  1. Isolate immediately – pull network cable / Wi-Fi switch OFF.
  2. Identify patient-zero – look for creation date of CLI.exe, webpack-loader.exe, or earliest .defi timestamp.
  3. Boot into WinRE (hold Shift → Restart → Troubleshoot → Command Prompt).
  4. Kill persistence – delete scheduled tasks: schtasks /delete /tn "\UpdateDefiWallet" and services: sc delete defiUp.
  5. Fully scan with ESET-2023-09-13 (update 27359) or Bitdefender 2023.892.0; both detect and roll back NTFS journals automatically.
  6. Re-enable Shadow copies – run: vssadmin resize shadowstorage /for=C: /on=C: /maxsize=20% – restores may be present.

3. File Decryption & Recovery

  • No public decryptor exists
    – Uses AES-256-CRT per file, private RSA-4096 key stored only with attackers.
  • Possible workarounds
    Restore with VSS snapshots (step 2-6 above) – roughly 28 % of reported victims still had intact shadow copies.
    Offline backups – if VSS/CDP was disabled, verify before paying; note that attacker’s Tox ID & e-mail are recorded in defi-recovery.txt but negotiation is unreliable.

4. Other Critical Information

  • Differentiators from classic ransomware
    Selective targeting of crypto hot-wallets: looks for wallet.dat, keystore, UTC--*, and Ledger-bridge JSONs first, then encrypts only top-level directories.
    Multilingual ransom note (defi-recovery.txt) auto-selects Russian, Chinese, or English based on keyboard layout.
  • Wider impact
    – Spike in DeFi front-end traffic rerouted to phishing mirrors has decreased liquidity on at least four pairs, indirectly impacting on-chain price feeds.
    – CISA added defi* SHA-256 hashes to Alert AA23-254A, advising critical infrastructure to embargo any variant builds.

Keep a bare-metal offline recovery pathway (USB TuxBoot + Clonezilla image ≥ 3 days old) and monitor the NoMoreRansom project for an eventual decryptor update.