Ramsay Malware Explained

Ramsay, also referred to as Ramsay Malware, is a cyber espionage framework and toolkit that was discovered by ESET Research in 2020.[1]

Ramsay is specifically tailored for Windows systems on networks that are not connected to the internet and that also isolated from intranets of companies, so called air-gapped networks, from which it steals sensitive documents like Word documents after first collecting them in a hidden storage folder.[2] [3]

ESET researchers found various versions of the malware, and believe that in May 2020 it was still under development. They numbered the versions Ramsay Version 1, Ramsay Version 2a and Ramsay Version 2b. The very first encounter with the malware was a sample that was uploaded from Japan to VirusTotal. The first version was compiled in September 2019. The last version that they found was most advanced.[1]

The discovery of Ramsay was seen as significant as malware is rarely able to target physically isolated devices.[4]

Authorship

While authorship has not been attributed, it has many common artefacts with Retro, a backdoor by hacking entity Darkhotel believed to operate in the interests of South Korea.[5]

Workings of the malware

The three versions of Ramsay that ESET found have different workings.

Ramsay version 1 does not include a rootkit, whilst the later versions do.

Ramsay version 1 and 2.b exploit CVE-2017-0199, a "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."[6]

Version 2.b also uses exploit CVE-2017-11882 as an attack vector.

The way in which Ramsay can spread is via removable media like USB sticks and network shares. In this way, the malware can jump the air gap.

External links

Notes and References

  1. Web site: New cyber espionage framework named Ramsay discovered by ESET Research | ESET. May 16, 2020. https://web.archive.org/web/20200516082145/https://www.eset.com/us/about/newsroom/press-releases/new-cyber-espionage-framework-named-ramsay-discovered-by-eset-research/. 2020-05-16.
  2. Web site: Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity. May 14, 2020. https://web.archive.org/web/20200514001437/https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/. 2020-05-14.
  3. Web site: New Ramsay malware can steal sensitive documents from air-gapped networks. ZDNet. May 13, 2020. https://web.archive.org/web/20200513163028/https://www.zdnet.com/article/new-ramsay-malware-can-steal-sensitive-documents-from-air-gapped-networks/. 2020-05-13.
  4. Web site: ESET found Ramsay malware targeting systems isolated by an air gap. May 20, 2020. https://web.archive.org/web/20200520151912/https://meterpreter.org/eset-found-ramsay-malware-targeting-systems-isolated-by-an-air-gap/. 2020-05-20.
  5. Web site: New Ramsay malware can steal sensitive documents from air-gapped networks. Catalin. Cimpanu. ZDNet.
  6. Web site: CVE-2017-0199 Detail . nvd.nist.gov . https://web.archive.org/web/20220729180605/https://nvd.nist.gov/vuln/detail/CVE-2017-0199 . 2022-07-29 . live.