deniz_kizi Ransomware – Community Resource
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact File Extension:
.deniz_kizi(always lower-case, no dot prefix). -
Renaming Convention: Files are renamed to the pattern
<original_name>.<original_extension>.deniz_kizi
Example:Annual_Budget.xlsx→Annual_Budget.xlsx.deniz_kizi
2. Detection & Outbreak Timeline
- First Publicly Documented Sample: 27 July 2023 (uploaded to MalShare & Any.run).
- Rapid Expansion: Noticeable spike in telemetry during the first week of August 2023,Centered on Turkey, the Levant, and parts of the EU with Turkish tech-sector suppliers.
- Most Recent Large Campaign: February 2024 phishing wave leveraging fake KVKK (“Turkish GDPR”) compliance documents.
3. Primary Attack Vectors
| Vector | Details & Real-world Examples |
|—|—|
| Malspam w/ Discord CDN URLs | Fake Turkish Airlines e-ticket / court-summons PDF; the PDF references (but contains no macro) → downloads an .hta stub from cdn.discordapp[.]com/attachments/…/BedavaBilet.hta. |
| RDP brute-forcing weak or leak credentials | Cf. CISA Alert AA24-058A – rotated by 9 Turkish ISPs in the Feb 2024 wave. Password lists contain word-mutations in Turkish (sifre123, parola++, etc.). |
| Fake “Patch Tuesday” installers | Obfuscated AutoIt script wrapped as SysUpdate_KB5021234.exe. |
| USB / removable drives | Uses a desktop.ini + hidden README_TURKISH.lnk in root to autorun My^Brief^.exe on double-click. |
| Exploited unpatched software | Abuses Open Management Infrastructure (OMI) CVE-2022-29149 for Linux footprints if dual-boot deployments; patched July 2022 yet still missed. |
Remediation & Recovery Strategies
1. Prevention
- Block known payload hosts
- Add
discordapp.com/attachments/**(risk-scored) for email & proxy egress log inspection. - IOC enforcement (bots monitor egress to
cdn.discordapp[.(]comdelivering.hta,.lnk,.ps1).
- Harden RDP & SSH
- Account lockout after 3-5 attempts, VPN-only jump boxes, CAPTCHA → MFA on gateway portals.
-
Enforce Controlled Folder Access (CFA) (Windows 10+) – prevents double-extension
.deniz_kizifrom writing outside protected folders. -
Update vulnerable software – patch MS Office, Adobe, and especially enterprise-customized
.hta,.js,.vbsfilters in Secure Email-Gateway (SEG) rules. - GPO disabling AutoPlay & Autorun.inf execution – noted to neuter USB spread.
- Canary tokens on mapped network shares – high-confidence early detection (DELETE/RENAME events on trigger-files).
2. Removal – Step-by-Step
- Isolate host – disable NIC, record MAC/IP, snapshot RAM before powering down.
-
Boot to WinRE / Linux forensics USB – mount disks read-only to copy
deniz_kizi.exebinary and encrypted files. - Neutralize persistence – typical locations:
-
HKCU\Software\Microsoft\Windows\CurrentVersion\Run→LicenseUpdater(base64 encoded below:bQBzAMAAQAA…) -
%AppData%\LICENSEfolder with disguisedupg.exe. - WMI event consumer ActiveScriptEventConsumer named
“wmiupdater”.
Linux side: adds systemd servicenohupUpdater.service.
-
Run respected AV engine(s) (e.g., Microsoft Defender, CleatriaAI, ESET) in offline mode to kill active processes (
svchost_kiz.exe,updatelic.dll). - Clean up Windows shadow copies incorrectly deleted by ransomware:
-
vssadmin list shadows– retrievable if onlyvssadmin delete shadowsattempt aborted.
- Verify network shares & lateral movement vectors – before re-connecting, examine DC firewall rules.
3. File Decryption & Recovery
- Current Decryption Status: No free decryptor available as of July 2024.
- Uses Curve25519 ephemeral key exchange + ChaCha20-Poly1305 symmetric encryption, keys deleted after encryption.
- Fallback tools/practices:
- Volume-Shadow-Copy retrieval (PowerShell:
Get-WinEvent -LogName "Microsoft-Windows-Backup" | Where-Object Id -eq5)). - Offline backup incrementality schedule: 3-2-1 model applied before first infection (restore encrypted
.deniz_kizifiles via Baseline restore). - Negotiation records show median ransom = 2.8 XMR; law-enforcement strongly discourages payment (sanctions risk & no guarantee of full key release).
4. Other Critical Information
Unique Characteristics
-
Geo-tagging payload info – binary embeds hard-coded string
“MarmaraDenizi”correlating with campaign targeting Turkish maritime & logistics companies. -
Switch-based file exclusion – skips
%TEMP%\JetBrainsby command-line flag--skipJetbrains(seen in Q2-2024 builds). -
Self-moderating ransom note – reads
<volumeSerial>.readmeto avoid duplicate drops per disk; results in oneKRALSACA_BILGI.txtplastered on every top-level directory after first trigger. - Propagates to Bluetooth–visible Windows 10 systems using “Nearby Sharing” moniker (“DenizKiziSend”).
Broader Impact
-
Dual-platform reach: Windows (primary) + Linux victims when Docker images mis-pulled from Turkish-language registries (
registry[.]kizidocker[.]com). - Third-Party MSP tooling abused – ConnectWise Control (ScreenConnect CVE) sessions forged using pilfered IT admin credentials.
- GDPR-implications – double-extortion leak portal “marmara-kz.github.io” hosted over GitHub Pages; Turkish Gov posts takedown DMCA Aug 2024, mirrors surface on Pastebin within hours. Reminder: Notify supervisory authority within 72 h if personal data exfiltrated.
Quick-Reference Checklist
[ ] Patch RDP/OMI, enable MFA & lock-out policies
[ ] Deploy PR.SA email rules to block .hta attachments w/ cdn.discordapp[.]com URLs
[ ] Enable Controlled Folder Access & Sysmon rule EventID 1 → Image ENDSWITH svchost_kiz.exe
[ ] Backups: offline & immutable, with test-restore scripted weekly
[ ] Create Canaries & lifecycle incident-response playbooks ready BEFORE infection – not after
Stay safe, and share responsibly.