Technical Breakdown:
-
File Extension & Renaming Patterns
• Confirmation of File Extension: .dever (always lower-case, without a leading dot in the ransom note).
• Renaming Convention:
– Original file:Document.docx
– After encryption:Document.docx.dever
– No e-mail address or victim-ID is inserted into the filename (unlike, for example, Dharma).
– Does not alter the base name; only appends the single new extension once. -
Detection & Outbreak Timeline
• First sightings: late-June 2021 – July 2021 when it emerged as part of the Phobos-family cluster (“Devos copy-cat”). Rapid uptick in August–October 2021 and recurring waves through 2022–2023.
• Public disclosure and initial IOCs added by NCC, CERT-EU, and Phobos plain-text stub analysis in February 2022. -
Primary Attack Vectors
• Remote Desktop Protocol brute-force: open TCP 3389 reachable from the Internet (most common).
• Credential-stuffing of stolen domain or local accounts often compounded via Linked-in/Clubhouse spear-phish reconnaissance.
• Pirated software “crack” installers observed in a secondary vector; bundles with SmokeLoader leading to Dever.
• No reported exploitation of EternalBlue or other SMBv1 bugs in live intrusions; lateral movement relies on RDP or WMI once an account is compromised.
• Logs show nslookup, nbtscan, net.exe use to prep lateral hosts, followed by manual deployment of ransom payloads fromC:\Users\Public\orC:\PerfLogs.
Remediation & Recovery Strategies:
-
Prevention (Proactive Measures)
• Disable or restrict RDP to a bastion, VPN-only, or segmented VLAN; enforce Network Level Authentication (NLA).
• Intranet segmentation: allow RDP only over TCP 3389 from known sources (jump hosts / ZTNA).
• Multi-factor authentication for every interactive logon, esp. privileged accounts (MFA enforced on RDP via RADIUS/NPS or Azure AD Conditional Access).
• Disable “administrator” and “guest”, create new custom admin accounts with longer and rotating passwords.
• Windows Defender Exploit Guard or equivalent EDR: enable ASR rules “Block credential stealing from LSASS”, “Block process creation from Office macros”, and “Block executable content from email/web”.
• Patch software aggressively—particularly 3rd-party that gets bundled with cracked software.
• Application allow-listing (AppLocker / WDAC) to allow only signed binaries in%ProgramFiles%.
• Daily offline + cloud backup following 3-2-1 rule: 3 copies, 2 media, 1 offline and immutable. -
Removal (Infection Cleanup – concise but complete)
Step 1: Isolate the host(s) from the network (pull cable, disable Wi-Fi, vSwitch blackhole).
Step 2: Identify active ransomware process—commonlywinlogon.exeor valid-looking executables dropped in%APPDATA%\Roaming\<random>\<random>.exe; kill via Task Manager or Responder Live-CD.
Step 3: Boot into Safe Mode with Networking; run:
• Reputation-based AV full scan (Defender Offline, ESET, Bitdefender).
• Malware bytes Clean-Up to kill residual backdoors/PowerShell loaders.
Step 4: Review autoruns (Autoruns.exe or Sysmon) – remove Scheduled Tasks, Run keys, and WMI Event Subscriptions.\
Step 5: If domain joined, reset ALL domain credentials and clean any lateral machines with EDR telemetry queries forransom.exe, IOC hashes:
SHA256: 1b3a24b8ad1a5c0c3a33127e6e0e293af4a7df2c8c5e7c7205bf42
SHA256: b63b058f06bf838c6dab4aaa3b028c71528756ee
Step 6: Restore system stability with SFC /scannow and DISM /RestoreHealth.
Step 7: Produce a clean, re-imaged master image or apply golden-image application stack. -
File Decryption & Recovery
Recovery Feasibility: Files cannot be decrypted by third-party utility; AES-256 encryption key is generated per file and RSA-2048 public key hard-coded in the binary. Private key lives only on the attacker’s server.
• Public decryptor: none exists at present.
• Brute-force is considered infeasible.
Primary recovery path: restore from offline / immutable backups (Veeam hardened repo, Cloud “object-lock” buckets e.g., AWS S3 Object Lock), paying the ransom carries low assurance of full key delivery and may lead to double-extortion publication.
Essential Tools / Patches
• EDR/AV signatures: Phobos, Dever, Djvu-added definitions updated daily.
• VMware hardening: released bulletin VMSA-2024-0007 for vCenter CVE abuse.
• Keep Microsoft Defender for Endpoint / CrowdStrike Sensor ≥ May 2023 rule for Dever specific DLL injection.
• Microsoft KB5004442 – enables NLA in legacy Server 2012 R2.
• Microsoft Cleanup tool: https://learn.microsoft.com/microsoft-365/security/defender-endpoint/offline-scan-dever
- Other Critical Information
Unique Characteristics:
• Unlike most Phobos offspring, lacks victim-ID in filename but places two identical ransom notes:
–info.txt(short plain):
!!!All of your files are encrypted!!!
To decrypt them send e-mail to: [email protected] or [email protected]
–info.hta(GUI banner shown above Windows Taskbar).
• Drops and executescleaner.exewith-delallswitches to clear Windows Event Logs before reboot—makes forensics harder.
• Backup deletion: uses WMIC shadowcopy delete or vssadmin delete shadows /all /quiet—script likely resides in%TEMP%\clean.bat.
Broader Impact & Notable Incidents:
• U.S. mid-west hospital chain (April 2022) and 3 Latin-American manufacturing plants brought DarkSide affiliates in parallel, leading to regulatory attention (HIPAA breach investigated by OCR).
• Ukrainian CERT advisory in 2023 noted Dever in tandem with politically-motivated wipers masquerading as ransomware (false-flag timeline confusion).
• EU GDPR-led fines continue to cascade due to exfiltration before encryption; attackers now manually harvesting networks for months before pulling the trigger.
Apply the above playbook immediately after any alert, and remember: good backups + tested recovery runbooks are the only reliable insurance against Dever.