Below is a consolidated, up-to-date briefing you can share with incident-response teams, system administrators, and end-users about the ransomware that appends “@outlook.com” to every encrypted file.
(The asterisk in the original note acts as a wildcard – on-disk the extension literally becomes “.id-archive.docx.id-A1B2C3D4[[email protected]*].1a2b3c)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension added:
.id-<8 hex>[<email>@outlook.com*].<random> - Renaming convention:
- Original filename is preserved.
- Victim ID, email address and random 4–6 character extension are appended.
Sample:estimate.xlsx.id-7F3AC8D1[[email protected]*].U5d7f9
- Ransom note: Decrypt-info.txt (or Decrypt-info.html) created in every folder and on the desktop.
2. Detection & Outbreak Timeline
- First telemetry visibility: late-January 2023 (earliest PE compile timestamp 21-Jan-2023)
-
Significant spikes:
– 5–9 Feb 2023 (large-scale mal-spam wave impersonating DHL delivery failures)
– 17–23 Mar 2023 (external-facing RDP + brute-force clusters in Eastern-EU hosting providers)
– Ongoing “low-and-slow” intrusions ever since, indicating affiliate model (RaaS).
3. Primary Attack Vectors
This strain is a Phobos-family derivative; typical ingress:
| Vector | Details | Mitigation tip |
|—|—|—|
| RDP / RDS brute-force | Exposed 3389 with weak or previously-cracked credentials. Affiliate uses NLBrute, tsunamik, etc. | Move RDP behind VPN or RD-Gateway; enforce lockout & 2FA. |
| Phishing attachments | ISO/ZIP/IMG lures → LNK → BAT → loader DLL. Macros are not required. | Block ISO/ZIP at mail-gateway; disable MS-DOS execution from Outlook via Group Policy. |
| Software flaws (secondary) | Post-exploitation manual step: deploys Mimikatz → lateral WMI/PsExec only after initial foothold is established. | Patch Credential Guard; restrict local admin; use tiered admin accounts. |
Remediation & Recovery Strategies
1. Prevention
-
Close/fix remote entry points first:
– Disable external RDP or enable IP-whitelists / VPN-only access.
– Push Windows cumulative updates to close BlueKeep, PetitPotam, PrintNightmare if still not patched. -
Harden mail pipeline:
– Strip ISO, IMG, or at minimum force Mark-of-the-Web prompting.
– Leave Office macros blocked by default. -
Network segmentation + LSA Protection, AppLocker policy that blocks unknown DLLs in
%TEMP%.
2. Removal – Step-by-Step Cleanup
- Isolate infected hosts immediately (pull network cable, disable Wi-Fi/Bluetooth).
- Collect volatile evidence (RAM dump, event logs, firewall logs) before wipe if forensics are required.
- Boot into Safe Mode with Networking; run Microsoft Defender Offline or reputable AV boot disk (Sophos, ESET, Bitdefender). All vendor signatures now detect Phobos/Fireee variants under various names (Trojan:Win32/Phobos.PB!MTB, Win32/Filecoder.Phobos.C, etc.).
- Check scheduled tasks (
schtasks /query /fo LIST /v) and Run keys: delete registry entries likeHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[random GUID]pointing to%APPDATA%\Roaming\[guid]\[executable].exe. - Conclude with a full reinstall / re-image – rootkits from prior Phobos waves have occasionally survived patchy clean-ups.
3. File Decryption & Recovery
- General stance: There is no public free decryptor released for Fireee/Phobos strains that use online RSA-2048 (keys stored on C2).
- Recovery options:
- Restore from offline/off-site backups (files encrypted and Synology snapshots wiped in many observed cases).
- Investigate volume shadow copies – Phobos calls
vssadmin delete shadows, but in one mid-2023 incident a mis-configuration preserved some VSS on an unmapped driver letter. - If the campaign used offline encryption: inspect
C:\ProgramData\Oracle\or%TEMP%\oracle.exe.log– Phobos occasionally dumps the local RSA key in debugging builds. (Highly rare; do not rely on it.) - Tools to keep handy:
- RakhniDecryptor (Kaspersky) – only for older Phobos (2019-2020) variants.
- Trend Micro’s Ransomware File Decryptor – same caveat.
- Do NOT pay. Negotiated keys are seldom released and affiliate disappears; one UK MSP paid 0.75 BTC, received an invalid key, and double-ext threats followed.
4. Other Critical Information
| Attribute | Observation |
|—|—|
| Double-extortion portal | hecd[@]onion.existsforever vpn – leak site launched 2023-03-09. |
| Cross-vector overlap | Leverages backdoor “SmokeLoader” first, which also drops RedLine Stealer in ~20 % of engagements. Monitor for post-ransomware identity-fraud. |
| Encryption depth | All local drives + mapped network shares, but does not touch C:\Windows, C:\$Recycle.Bin, or any path with <random>.pri (Dynamics-related DBs). Useful for carving. |
| Persistence trick | Creates a value named shell32.servicehost under …\RunServices in addition to the more visible Run keys. |
| “Pilot” extension for testing | During the initial two-minute pilot phase some files gain *.test-d extension before the final @outlook.com* renaming. If you spot this, you have seconds to kill the process before bulk encrypt begins. |
Bottom-line Action List (30-Second Summary)
- Block external 3389 NOW (VPN only).
- Backups offline + test restore weekly.
- Update Windows, Exchange, VPN appliance patches published in 2022–2023.
- Deploy AppLocker to stop %TEMP% binaries.
- If hit: isolate → image → wipe → restore; do not pay.
Feel free to republish or localize this advisory – attribution appreciated but not required.