Endpoint
7/17/2014
10:30 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Ransomware: 5 Threats To Watch

Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
Previous
1 of 6
Next

As Windows software vulnerabilities have gradually decreased in the wake of Microsoft's secure development lifecycle approach to writing code, the bad guys have been forced to raise the bar and get more creative. Enter ransomware, a nasty form of malware that not only infects your machine but also locks you out of it -- and in many cases, encrypts the data so you can't retrieve it.

The most infamous of these malware families is CryptoLocker, which uses a strong encryption algorithm to lock a victim's files on local drives and network shares. Some victims have paid $300 or more to get their data decrypted and returned to them -- but even paying ransom doesn't guarantee you'll get your data back, or that the bad guys don't still sell it for profit.

[A Black Hat USA speaker will give the backstory on how he and others helped disrupt the infamous CyptoLocker operation, and what they learned about it. Read How Researchers Helped Cripple CryptoLocker.]

But CryptoLocker's head was lopped off in early June after a massive global initiative by the FBI, international law enforcement agencies, and security firms, which seized its key command and control servers. CryptoLocker remains out of action at this point, but there are plenty of other ransomware families circulating and waiting in the wings to fill the void. One such family, Cryptowall, is being blamed for a recent breach at brokerage house Benjamin F. Edwards & Co

"Ransomware, because of its high-margin profits and the rather simple chain of people that need to be involved, will likely surge in the near-term for PC users," says John Bambenek, chief forensic examiner at Bambenek Consulting and a ransomware expert. "Unlike typical credit card fraud and the like that require money mules, reshippers, and card cloners… all you need to make money with ransomware is a tool and access to Bitcoin or a means to cash in moneypak or similar cards. The trick is a good delivery mechanism." 

Here's a look at the top ransomware threats to watch out for:

Source: Perspecsys
Source: Perspecsys

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/24/2014 | 2:50:53 PM
Re: good overview
I think you are exactly correct.  Sometimes I lose track that I see this stuff on a daily basis and I take being able to spot it for granted.  The normal user isn't naturally cautious and as such prone to falling for scams.  I have to tell myself that if I didn't know better, it would be very scary to receive a receipt for $2500 in furniture and I would want to know right away what was going on.

Constant education is the answer.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
7/24/2014 | 2:03:43 PM
Re: good overview
I have heard a similar version of that story from enterprise security pro many, many times! I guess the takeaway is that you need to give that presentation every couple of months... 
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/24/2014 | 1:58:15 PM
Re: good overview
I was asked to give a presentation on how to spot malicious and phishing emails shortly afterwards.   I gave a 30 minute presentation that included several hard examples including the email that caught the President.

Things seemed great for a while but less than 6 months later, another employee(who was in the presentation) fell for another email.  Sometimes I just don't know what to do...
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
7/24/2014 | 1:37:40 PM
Re: good overview
But did it change the security culture at the non-profit ? Any impact on practices, user ed, etc? 
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/24/2014 | 11:50:00 AM
Re: good overview
Very much so a nightmare...

However, other than costing a little over $500 it served as a valuable lesson for the President.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/24/2014 | 11:14:36 AM
Re: good overview
Wow--that's a nightmare scenario with a relatively good ending.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/24/2014 | 10:59:06 AM
Re: good overview
The attack vector was an email pretending to contain a receipt for a large purchase.

This time the ransom was not paid.  However, when cryptolocker was brand new the President of one of these non-profits fell victim.  She had a bad habit of not storing her data on the server (which was backed up) and instead stored the data locally.  As such, she had 10 years worth of data encrypted and no way to recover it.

Long story short, we paid the ransom and were able to decrypt the files.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/24/2014 | 10:45:40 AM
Re: good overview
Were you able to determine how they were infected? Did any of them actually pay the ransom?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
7/22/2014 | 9:37:56 AM
Re: good overview
I volunteer with a few non-profits in my area and unfortunately one of them was completely crippled by the Cryptowall ransomware.  We were able to restore most of the data from backup but not all.  
chriscinfosec
50%
50%
chriscinfosec,
User Rank: Apprentice
7/22/2014 | 9:26:49 AM
Ransomware a growing threat
We see a lot of blocked ransomware attempts at Invincea, increasingly being spread through malicious ad networks ("malvertising").  Most small-to-medium sized businesses have much less risk from the theft of IP or click-fraud bots if they get infected -- ransomware on the other hand encrypts your files making them inaccessible.  This can jeopardize your business very quickly and is almost impossible to recover from.  Paying the ransom doesn't always work...
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?