email-*@*id-*.*
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
email-*@*id-*.*
(wild-cards are literal – every encrypted file receives its own unique address, e.g. [email protected], [email protected])
-
Renaming Convention:
- Original name + original extension are kept.
- The string
email-<attacker-e-mail>@<host>.id-<8-hex-chars> is appended directly to the file name (no dot before the extension).
- Folders and mapped network shares are processed recursively; every encrypted document therefore advertises the same criminal e-mail address.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: First public submissions appeared 28-May-2020; infection waves peaked June-July 2020 and again March-April 2021.
3. Primary Attack Vectors
- RDP brute-force / credential-stuffing (TCP/3389 exposed to Internet, weak passwords, previous breach dumps).
- Pirated software (“crack” installers for Adobe, Office, games) bundled with malware dropper.
- Phishing attachments (ISO, .ace, .img) containing self-extracting archive that launches
smartssh.exe (main payload).
- No known exploit-kit or SMB/EternalBlue component – human-assisted intrusion followed by manual deployment is typical.
1. Prevention
-
Proactive Measures:
- Block RDP at perimeter; if business-critical, require VPN + MFA, set “Network Level Authentication”, account lock-out after 3 failed logins.
- Remove local-Administrator rights from daily-use accounts; disable RDP for Domain Admin.
- Patch OS/apps monthly; inventory “cracked” software and remove it (attackers frequently back-door the same cracks).
- E-mail: filter ISO/IMG attachments; use Windows ASR rules to block executable content from e-mail.
- Back-up 3-2-1 model (3 copies, 2 media, 1 off-line/off-site); store credentials in hardware token or separate AD forest.
- White-list PowerShell and PsExec execution via AppLocker / WDAC (ransomware abuses
powershell.exe to delete shadow copies).
2. Removal
- Physically disconnect the host from network; isolate VLAN if present.
- Collect triage:
C:\Users\<u>\AppData\Roaming\smartssh.exe, readme.txt ransom note, scheduled task \\Microsoft\\Windows\\SmartSshUpdater.
- Boot into Safe Mode + Networking; run reputable AV/EDR scan (definitions “Ransom:Win32/Phobos” or “Ransom.Win32.EmailID”).
- Delete malicious PE, persistence tasks, and accompanying
*.bat files that clear event logs.
- Patch local accounts, force password reset, and verify no rogue user profiles were created.
- Update AV signatures and run full scan on any restore candidates before returning them to production.
3. File Decryption & Recovery
-
Recovery Feasibility: At the time of writing there is NO free decryptor for the
email-*@*id-*.* variant of Phobos. It uses AES-256 in CBC mode with a unique key for each victim; the private RSA-1024 key resides only on the attackers’ server.
-
Available Tools:
- Upload a pair of identical plain/encrypted files to Emsisoft and Kaspersky check-pages for future free decrypter notification.
- ShadowExplorer or
vssadmin list shadows – occasionally kills the service too late; try but do not rely.
- File-recovery carving utilities (PhotoRec, R-Studio) can grab non-encrypted copies only if disk space has not been trimmed.
-
Essential Patches/Updates: March 2021 cumulative Windows patch fixed “PetitPotam” NTLM relay; although
email-* does not use it, apply to keep lateral movement options closed.
-
Unique Characteristics:
- Victim-specific e-mail address included in every file name; convenient IOC but also social-engineering tactic (users instinctively e-mail “support” address).
- Employs Living-off-the-Land commands (
bcdedit /set {default} recoveryenabled No, wbadmin delete catalog, vssadmin resize).
- Skips
%WINDIR%, %PROGRAMFILES%, and executables to keep machine bootable – maximizes ransom pressure.
- Drops both
info.hta (splash window) and readme.txt; ransom note lists multiple ProtonMail/Tutanota addresses.
-
Broader Impact: Hospitals hit in summer 2020 reported OT device downtime; attackers demand 0.5 – 1.5 BTC, but frequently accept 20-30 % negotiated discount. Campaigns overlap with “Dharma/CrySiS” affiliates; some victims receive second ransom demand weeks later from same actor, indicating retained back-door access – therefore always re-image entire estate after incident.