Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

End of Bibblio RCM includes -->
9/28/2016
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates

Ransomware Rages On

[Black Hat Europe 2016 Sponsor Content: iboss Cybersecurity]

A hunger for profit drives ransomware’s growth. This year the cost of ransomware may reach 40-times that of last year, according to data from “Hackerpocalypse: A Cybercrime Revelation,” a report from the Herjavec Group.

Attackers use ransomware to profit quickly, easily, repeatedly, and anonymously. Whether you pay or not, you stand to lose something. You’re either out the funds and on the list for more attacks, or you’re punished for standing fast. Penalties for nonpayment include deleting, publishing, and selling your data (to other hackers) and launching DDoS attacks designed to bring your site down.

Though ransomware is evolving, attack vectors point to workable solutions that are available now.

Ransomware Evolution

Before enterprises figure out how to mitigate the ransomware that currently exists, attackers have already taken the next step in evolving this threat, making it more perplexing, commonplace, and malicious. As countless new examples routinely appear in the marketplace, ransomware takes on new capabilities and adds complexities that confound security companies. Recently, malware coders supplemented Locky ransomware with the capacity to encrypt files inside servers and computers without an Internet connection, using a built-in encryption mechanism.

Still other malicious software developers have made a Ransomware-as-a-Service offering available with an affiliate program for distributors; it is now easier to resell ransomware to other criminal hackers, further popularizing these attacks. As ransomware proves its viability for operating systems such as Android and devices in the Internet of Things, the attack surface broadens and the potential results of attacks become more venomous.

Attack Vectors Point to Protection Methods

Cyber crooks send ransomware using these methods, among others:

· email using infected links and attachments;

· drive-by attacks where unsuspecting employees surf to infected websites or click on malicious advertisements (called Malvertising);

· hacked remote desktop servers where they then trigger the ransomware attack. This last method that was only recently discovered.

For email and drive-by attacks, organizations should consider anti-spam tools that require manual confirmation from a human being before letting email through. They should also look into blocking all email attachments and using other more secure file transfer methods and deploy a best-in-breed anti-phishing tool. Other strategies should include using text-only email, teaching employees the signs of infected links, and continually updating blacklists of known bad sites and/or use whitelists of known good sites.

It’s equally important to close up remote desktop servers if you don’t use them or heavily constrain remote desktop access using long, strong passwords and two- and three- factor authentication, changing passwords often.

Use Every Layer of Protection Possible

Ransomware is now a popular, effective, and profitable approach that cyber criminals increasingly insert or inject into attacks by a variety of means. Remote desktop server attacks are a good example of this as these attacks are a diversion from more traditional drive-bys and email. Because of this, your justification for using every layer of protection available, for tightening down every configuration, for hardening every system, and for following and enforcing every policy now also include ransomware.

 

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file