Skip to content

axon-git/OneDriveRansomwareSimulator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OneDrive Ransomware Simulator

Description

OneDriveRansomwareSimulator is a proof-of-concept tool that is designed to allow simulating ransomware capabilities against OneDrive in Microsoft 365.

Disclaimer

This tool was created as a simulation tool to increase awareness around ransomware threats and to help improve the security posture of organizations. This tool should be used solely for authorized security research purposes. This tool is provided “as is” and Hunters.secuity disclaims any and all warranties and liabilities regarding the use/misuse of this tool. Use responsibly.

How It works

Starting a ransomware attack simulation

  1. When the tool is set to start a ransomware attack, it will use the access token to set a session to OneDrive. The access token should be set in ./config/token.txt (or elsewhere by specifying the optional --key-path argument).
  2. If the tool is set to generate an encryption new key (using the optional flag --generate-key to create a symmetric key), it will generate a key and write it to a default file location at ./config/key.txt (can be customized by the optional --key-path argument).
  3. By default, the tool will not encrypt the target user's personal drive, but will upload dummy files into a specific new folder called ransomware_tests and will conduct its action upon the folder's content. To change this, the flag --use-user-native-file needs to be specified.
  4. The tool will enumerate all files that are stored in the user's (that the token belongs to) private drive. As a security measure, the tool will not encrypt files that are stored in drives shared with the user.
  5. After having a list of all the files to encrypt, the tool will iteratively:
    1. Read a file's content
    2. Encrypt the content using the specified encryption key
    3. Permanently delete the original file
    4. Upload the new encrypted file with the original name with an encrypted extension suffix
  6. The default encrypted file extension is set to .enc and be configured by using the optional --encrypted-file-extension argument.

Reverting a ransomware attack simulation

  1. Similarly to the encryption flow, when the tool is set to revert a ransomware attack, it will use the access token to set a session to OneDrive. The access token should be set in ./config/token.txt (or elsewhere by specifying the optional --key-path argument).
  2. The tool will use the key that is set in ./config/key.txt (or elsewhere set by the optional --key-path argument) as the decryption key
  3. The tool will enumerate all files that are stored in the user's (that the token belongs to) private drive. As mentioned before, the tool will not encrypt files that are stored in drives shared with the user.
  4. After having a list of all the files to decrypt, the tool will iteratively:
    1. Read the file content
    2. Decrypt the content using the decryption key
    3. Permanently delete the encrypted file from OneDrive
    4. Upload the new decrypted file with the original name without the encrypted extension suffix
  5. Same as before, the default file extension of the encrypted files is set to .enc and be configured by using the --encrypted-file-extension option.

Hunting Queries

After simulating the ransomware, it is recommended to perform an analysis of the activities made during the simulation.

Threat hunting queries are available here

How to use

OneDriveRansomwareSimulator uses Poetry to allow easy and fast dependencies installation.

Installation

  • Set up relevant packages and dependencies using Poetry.

     git clone [email protected]:axon-git/OneDriveRansomwareSimulator.git  
     poetry install  
     poetry shell  
    
  • Set the Azure access token in the ./config/token.txt file.

  • Set the Encryption key in the ./config/key.txt file.
    It is possible to let the tool generate a new encryption key by specifying --generate-key

Usage

usage: main.py [-h] --target-user TARGET_USER [--start-ransomware]
               [--revert-ransomware] [--generate-key]
               [--use-user-native-files] [--key-path KEY_PATH]
               [--token-path TOKEN_PATH] [--tenant-id TENANT_ID]
               [--client-id CLIENT_ID] [--client-secret CLIENT_SECRET]
               [--encrypted-file-extension ENCRYPTED_FILE_EXTENSION]

OneDrive ransomware attack simulator

options:
  -h, --help            show this help message and exit
  --target-user TARGET_USER
                        Provide the name of the targeted user
  --start-ransomware    Start a ransomware attack by encrypting all the remote
                        files
  --revert-ransomware   Revert a ransomware attack by decrypting all the
                        remote files
  --generate-key        When specified, a new key will be generated.
                        Otherwise, a key will be read from the key path
  --use-user-native-files
                        When specified, the tool will directly encrypt/decrypt
                        the files the user's drive
  --key-path KEY_PATH   Path to symmetric encryption/decryption key./default:
                        ./config/key.txt
  --token-path TOKEN_PATH
                        Path to the JWT token. default: ./config/token.txt
  --tenant-id TENANT_ID
                        Tenant ID of application for token generation
  --client-id CLIENT_ID
                        Client ID of application for token generation
  --client-secret CLIENT_SECRET
                        Client secret of application for token generation
  --encrypted-file-extension ENCRYPTED_FILE_EXTENSION
                        The extension of the encrypted files. default: .enc

Examples

Start a Ransomware Attack Simulation

Case #1 - Easy run

Execute a ransomware attack on [email protected]'s personal drive, take the token from the default location ./config/token.txt, generate a new encryption key and store it in the default location ./config/key.txt

python /OneDriveRansomwareSimulator/main.py --target-user [email protected] --start-ransomware --generate-key

Case #2 - Load access token from a different path

Execute a ransomware attack on [email protected]'s personal drive, take the token from /Downloads/access_token.txt, generate a new encryption key and store it in ./config/key.txt

python /OneDriveRansomwareSimulator/main.py --target-user [email protected] --start-ransomware --token-path /Downloads/access_token.txt --generate-key

Case #3 - Let the simulator create an access token

Execute a ransomware attack on [email protected]'s personal drive, generate an access token toekn using a registered application 'credentials' (tenant ID, client ID, client secret), generate a new encryption key and store it in ./config/key.txt

python /OneDriveRansomwareSimulator/main.py --target-user [email protected] --start-ransomware --generate-key --tenant-id XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --client-id YYYYYYYY-YYYY-YYYY-YYYY-YYYYYYYYYYYY --client-secret mylittlesecret

Revert a Ransomware Attack Simulation

Revert a ransomware attack on [email protected]'s personal drive, take the token from the default location ./config/token.txt and use the decryption key stored in ./config/key.txt

python /OneDriveRansomwareSimulator/main.py --target-user [email protected] --revert-ransomware

Credits

OneDrive's objects and API utilization were inspired from DoubleDrive by SafeBreach

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages