Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/22/2013
04:58 PM
50%
50%

CryptoLocker Could Herald Rise Of More Sophisticated Ransomware

A smarter approach to encryption is what separates CryptoLocker from other ransomware -- but that might not last long

Seven hundred and fifty dollars -- that is the amount of money it cost a police department in Massachusetts to regain access to its computer files. The culprit of this kidnap and ransom was the now-infamous CryptoLocker, which locked both images and Microsoft Word documents on the department's computer system.

While precise statistics are hard to come by, researchers at Symantec say they are seeing hundreds of thousands of spam email messages a day distributing the threat, with hundreds of infections per day. Ransomware scams are still in vogue, but where CryptoLocker makes its mark is its use of asymmetric encryption -- and don't be surprised if security vendors are not the only ones taking notice. Other attackers will move in this direction as well.

"It's not a revolution, but a natural evolution," says Lance James, head of intelligence at Vigilant by Deloitte. "Putting it bluntly, I think we expected this sooner and should be surprised it took so long. Yes, others will move in this direction, or they will sell CryptoLocker base code to enable the development of related ransomware, thus spawning in the underground a new widespread standard, if you will, for ransomware."

Unlike other ransomware, CryptoLocker's authors have properly implemented an asymmetric system (2048 bit RSA) and 256 bit AES-CBC using the native Microsoft Windows crypto system, which is the basis for legitimate tools such as BitLocker, he explains.

"Most encryption uses a symmetric [one key] key system or simply locks access to the files but does not fully encrypt the data," James says. "A reverse engineer can simply build tools that recover the key or leverage knowledge of how the software works to unlock the files. Encryption mechanisms found in other ransomware are of a homebrew variety -- they include errors and vulnerabilities that reversers and infosec professionals can identify, thereby enabling the creation of workarounds to neutralize the intent of the ransomeware."

Once on the system, the malware can encrypt files located within shared network drives, USB drives, external hard drives, network file shares, and even some cloud storage drives. If one computer on a network becomes infected, then mapped network drives could become infected as well. CryptoLocker then connects to the attackers' command-and-control server to put the asymmetric private encryption key "out of the victim's reach," according to a warning from US-CERT.

"I wouldn't say it is necessarily any more sophisticated, but perhaps just better executed," notes Chet Wisniewski, senior security adviser at Sophos. "They aren't pretending to be the cops. They are simply encrypting your files, demanding money, and mostly honoring their end of the bargain -- simple, straight to the point of extortion."

Ransomware that was popular early in the year didn't even perform encryption -- it just locked the screen with a "scary law enforcement message and demanded money," he adds.

Ransomware can be a very profitable type of operation. In a paper (PDF) released last year, Symantec estimated that one particular group was extorting nearly $400,000 a month from victims.

Ransomware attacks have been on the uptick for the past several quarters. According to McAfee's third quarter threat report (PDF), more than 312,000 new, unique samples were detected during that three-month period -- less than the previous quarter, but still the second-highest figure the firm has seen.

"Ransomware is not new, but evidently its creators are making money from it, and that is the key to its persistence," observes Roger Thompson, chief emerging threat researcher at ICSA Labs. "In fact, it seems to have replaced fake antivirus as a common form of monetization. I can't remember the last time I saw a fake AV. You'd think that the interaction required to pass money would get more people caught, but I suspect it is a function of small amounts combined with multiple jurisdictions. In other words, it seems too much trouble for the police to be bothered."

The good news, Wisniewski notes, is that businesses and home users can take a number of precautions.

"Keep your antivirus up to date and be sure not to allow EXE files to come in as email attachments," he says. "Block EXE files inside of archives, like ZIP and RAR, at the mail gateway. CryptoLocker is primarily being installed through existing Zeus/ZBot infections, and Zeus comes in through email and drive-by installs on booby-trapped websites. Do your backups. Don't pay the crooks or depend on their honesty to decrypt your files. Ensure the important information in your organization is backed up regularly."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
macker490
50%
50%
macker490,
User Rank: Ninja
11/24/2013 | 1:27:29 PM
re: CryptoLocker Could Herald Rise Of More Sophisticated Ransomware
a "CryptoLocker" hit should be treated as a hard drive fail. wipe the drive, re-install the os, and restore your data.

remember, cryptolocker will get all the active disks in your 'puter and goes after network shares as well. you will need an air-gap between your online system and your backup drive.
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24376
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory w...
CVE-2021-24377
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on t...
CVE-2021-24378
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute w...
CVE-2021-24379
PUBLISHED: 2021-06-21
The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some...
CVE-2021-24383
PUBLISHED: 2021-06-21
The WP Google Maps WordPress plugin before 8.1.12 did not sanitise, validate of escape the Map Name when output in the Map List of the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue