Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/22/2013
04:58 PM
50%
50%

CryptoLocker Could Herald Rise Of More Sophisticated Ransomware

A smarter approach to encryption is what separates CryptoLocker from other ransomware -- but that might not last long

Seven hundred and fifty dollars -- that is the amount of money it cost a police department in Massachusetts to regain access to its computer files. The culprit of this kidnap and ransom was the now-infamous CryptoLocker, which locked both images and Microsoft Word documents on the department's computer system.

While precise statistics are hard to come by, researchers at Symantec say they are seeing hundreds of thousands of spam email messages a day distributing the threat, with hundreds of infections per day. Ransomware scams are still in vogue, but where CryptoLocker makes its mark is its use of asymmetric encryption -- and don't be surprised if security vendors are not the only ones taking notice. Other attackers will move in this direction as well.

"It's not a revolution, but a natural evolution," says Lance James, head of intelligence at Vigilant by Deloitte. "Putting it bluntly, I think we expected this sooner and should be surprised it took so long. Yes, others will move in this direction, or they will sell CryptoLocker base code to enable the development of related ransomware, thus spawning in the underground a new widespread standard, if you will, for ransomware."

Unlike other ransomware, CryptoLocker's authors have properly implemented an asymmetric system (2048 bit RSA) and 256 bit AES-CBC using the native Microsoft Windows crypto system, which is the basis for legitimate tools such as BitLocker, he explains.

"Most encryption uses a symmetric [one key] key system or simply locks access to the files but does not fully encrypt the data," James says. "A reverse engineer can simply build tools that recover the key or leverage knowledge of how the software works to unlock the files. Encryption mechanisms found in other ransomware are of a homebrew variety -- they include errors and vulnerabilities that reversers and infosec professionals can identify, thereby enabling the creation of workarounds to neutralize the intent of the ransomeware."

Once on the system, the malware can encrypt files located within shared network drives, USB drives, external hard drives, network file shares, and even some cloud storage drives. If one computer on a network becomes infected, then mapped network drives could become infected as well. CryptoLocker then connects to the attackers' command-and-control server to put the asymmetric private encryption key "out of the victim's reach," according to a warning from US-CERT.

"I wouldn't say it is necessarily any more sophisticated, but perhaps just better executed," notes Chet Wisniewski, senior security adviser at Sophos. "They aren't pretending to be the cops. They are simply encrypting your files, demanding money, and mostly honoring their end of the bargain -- simple, straight to the point of extortion."

Ransomware that was popular early in the year didn't even perform encryption -- it just locked the screen with a "scary law enforcement message and demanded money," he adds.

Ransomware can be a very profitable type of operation. In a paper (PDF) released last year, Symantec estimated that one particular group was extorting nearly $400,000 a month from victims.

Ransomware attacks have been on the uptick for the past several quarters. According to McAfee's third quarter threat report (PDF), more than 312,000 new, unique samples were detected during that three-month period -- less than the previous quarter, but still the second-highest figure the firm has seen.

"Ransomware is not new, but evidently its creators are making money from it, and that is the key to its persistence," observes Roger Thompson, chief emerging threat researcher at ICSA Labs. "In fact, it seems to have replaced fake antivirus as a common form of monetization. I can't remember the last time I saw a fake AV. You'd think that the interaction required to pass money would get more people caught, but I suspect it is a function of small amounts combined with multiple jurisdictions. In other words, it seems too much trouble for the police to be bothered."

The good news, Wisniewski notes, is that businesses and home users can take a number of precautions.

"Keep your antivirus up to date and be sure not to allow EXE files to come in as email attachments," he says. "Block EXE files inside of archives, like ZIP and RAR, at the mail gateway. CryptoLocker is primarily being installed through existing Zeus/ZBot infections, and Zeus comes in through email and drive-by installs on booby-trapped websites. Do your backups. Don't pay the crooks or depend on their honesty to decrypt your files. Ensure the important information in your organization is backed up regularly."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
macker490
50%
50%
macker490,
User Rank: Ninja
11/24/2013 | 1:27:29 PM
re: CryptoLocker Could Herald Rise Of More Sophisticated Ransomware
a "CryptoLocker" hit should be treated as a hard drive fail. wipe the drive, re-install the os, and restore your data.

remember, cryptolocker will get all the active disks in your 'puter and goes after network shares as well. you will need an air-gap between your online system and your backup drive.
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14540
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
CVE-2019-16332
PUBLISHED: 2019-09-15
In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
CVE-2019-16333
PUBLISHED: 2019-09-15
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
CVE-2019-16334
PUBLISHED: 2019-09-15
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
CVE-2019-16335
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.