New ransomware abuses Windows PowerShell, Word document macros

The PowerWare ransomware is written completely in the Windows PowerShell scripting language

A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including health care organizations, researchers warn.

PowerShell is a task automation and configuration management framework that's included in Windows and is commonly used by systems administrators. It has its own powerful scripting language that has been used to create sophisticated malware in the past.

The new ransomware program, dubbed PowerWare, was discovered by researchers from security firm Carbon Black and is being distributed to victims via phishing emails containing Word documents with malicious macros, an increasingly common attack technique.

The Carbon Black team found PowerWare when it targeted one of its customers: an unnamed healthcare organization. Multiple hospitals have recently fallen victim to ransomware attacks.

The malicious Word documents masqueraded as an invoice, the Carbon Black researchers said. When opened, it instructed users to enable Word editing and content, claiming that these actions were necessary to view the files.

In reality, enabling editing disables Microsoft Word's "preview" sandbox and enabling content allows the execution of the embedded macro code, which Office blocks by default.

If the malicious macro code is allowed to run, it opens the Windows command line (cmd.exe) and launches two instances of PowerShell (powershell.exe). One instance downloads the PowerWare ransomware from a remote server in the form of a PowerShell script and the other instance executes the script.

After this point, the infection routine is similar to that of other ransomware programs: The script generates an encryption key; uses it to encrypt files with specific extensions, including documents, pictures, videos, archives and source code; sends the key to the attackers' server and generates the ransom note in the form of an HTML file.

Based on the payment instructions, the attackers use the Tor anonymity network to hide their command-and-control server. The initial ransom is $500, but it goes up to $1,000 after a couple of weeks.

PowerWare is not the first ransomware implementation in PowerShell. Security researchers from Sophos found a similar Russian-language ransomware program back in 2013. Then in 2015, they found another one that used the "Los Pollos Hermanos" logo from the Breaking Bad TV show.

While PowerShell-based malware is not new, its use has increased in recent months and it is arguably harder to detect than traditional malware because of PowerShell's legitimate use and popularity, especially in enterprise environments.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Father’s Day Gift Guide

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?