Bad rabbit

How to protect yourself with our firewalls and secure browser - Ransomware Bad Rabbit

In October 2017, a wave of attacks began that is now better known as Bad Rabbit. Initially, Eastern European companies and authorities were the main targets. Eventually, Bad Rabbit also spread to other countries, including Germany. Find out exactly what Bad Rabbit is and how you can protect yourself against it.

Background: What is Bad Rabbit?

Bad Rabbit is a new form of ransomware. This form of cybercrime where the data of certain targets are encrypted has already established itself. Bad rabbit is named after the page in the darknet, where the victim of this attack is able to pay the ransom in the hope of retrieving his or her data.

What is different about this encryption Trojan?

Bad Rabbit is also known as a watering hole attack. This describes an approach in which IT criminals are now focusing more on central, strategic goals, such as specific websites that potential targets frequently visit. So when victims visit a certain landing page, a drive-by download automatically starts. Specifically, a fake Adobe Flash installation file is downloaded, which leads to an infection with Bad Rabbit. After a forced restart, all data is encrypted on the PC.

Can Bad Rabbit also spread to the network?

Bad Rabbit is also able to spread across the IT network of the company or agency. Unlike WannaCry and NotPetya, Bad Rabbit does not exploit the vulnerability in the Windows SMB protocol. Instead, other computers are infected via the Windows Management Instrumentation (WMI).WMI is Microsoft’s Web-Based Enterprise Management (WBEM). Among other things, you are able to obtain management data from remote computers with it.

How can you protect yourself from attacking the PC?

Let's start with the protective measures you can do on the PC. There are two variants here.

Variant 1

  • Block the execution of the files c: \ windows \ infpub.dat and c: \ windows \ cscc.dat.
  • If possible, disable WMI on your Windows system to prevent the malware from spreading through your network.
  • Insert a local anti-virus scanner.

Variant 2

  • We recommend the use of Browser in the Box. The technology used makes it possible to effectively protect against such an attack. The innovative approach to Browser in the Box is that the operating system and browser are completely separate. The browser itself runs on a PC in a virtual machine and thus a complete isolation is achieved. Malware can not infect the user's PC and the network. More information can be found here on our website.

How can you protect your network?

As mentioned already, Bad Rabbit can also spread to the network. Therefore, here are some suggestions for protecting your IT network. This is where our gateprotect firewalls come into play:

In the network

1. Separate important servers from your computers. The keyword here is “network separation”.

2. Deploy network virus scanners.

Protection at the gateway

  • The virus scanner used by our gateprotect firewalls detects UDS: DangerousObject.Multi.Generic over which BadRabbit is running. We recommend that you use the proxy on HTTP and HTTPS in order to use the virus scanner from the UTM package safely.
  • The content filter provided by us offers the possibility to block downloads. Here you can block the download of any * .exe files.
  • The content filter also provides the ability to block certain categories of websites. You should use the sub-categories "Spam" and "Malware" actively.
  • Important: Generally, we advise against paying the ransom. It is not certain that your data will be decrypted after you have payed. Take NotPetya as an example; here the data wasn’t retrieved after payment. Additionally, you may end up on a list that will be used to target you in the future.

Need more information or more advice?

If you have further questions, please write an email to

Request information

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

I want to receive information from Rohde & Schwarz via

Marketing permission

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error is occurred, please try it again later.