Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/21/2017
09:00 AM
50%
50%

Small,Targeted Ransomware Attacks Emerge

Cybercriminals narrow their focus on specific industries, geographies, or size for a better return on investment, security experts say.

Ransomware attackers in the past year have begun to launch small, targeted campaigns, seeking a better return on their investment of time and money.

Cybercriminals are expanding beyond ransomware "spray and pray" attacks delivered by spam, and focusing instead on specific industries, geographies, or companies of a particular size with ransomware phishing campaigns, according to security experts.

"For most of 2016, ransomware campaigns were sent by spam. On some days, tens of millions of emails were sent out," says Patrick Wheeler, director of threat intelligence for Proofpoint. He says spray and pray campaigns were designed to infect as many machines as possible with the expectation that a certain percentage of the victims would pay the ransom.

Ransomware will mostly involve targeted campaigns in the future because attackers know they can get more money with this method, says Anton Ivanov, lead malware analyst with Kaspersky Lab. Attackers behind ransomware campaigns have gone as far as creating special teams with specific developer skills to penetrate networks and language skills to write phishing emails that appear more convincing, too, he says.

Financial organizations, higher-education institutions, and healthcare, manufacturing, and technology companies, are some of the industries that have been hit this year with targeted ransomware campaigns.

"We find when ransomware targets specific verticals, it is usually healthcare and higher education. We don't know why these verticals, but maybe because there is a large user base," says Wheeler.

A previously undocumented strain of the Defray ransomware was used in one attack against healthcare companies and educational institutions, while another Defray attack targeted manufacturing and technology companies, according to a Proofpoint report.

PetrWrap, a Petya-based ransomware variant, targeted financial organizations across the globe, according to Kaspersky.

Wheeler says the Philadelphia ransomware authors initially targeted healthcare companies, while Petya's authors concentrated on regions within Germany during the spring. Other ransomware campaigns also targeted specific geographies: Serpent's authors focused their campaign on the Netherlands then Belgium, while Crysis targeted German organizations, he says.

Company size also factors into targeted ransomware attacks. Mamba ransomware authors target large organizations with more than 1,000 endpoints, Ivanov says, citing the high-profile attack against the San Francisco Municipal Transportation Agency as one example.

"They are focusing on big organizations because with ransomware, [the payout] is based on how many endpoints you can compromise," Ivanov says, adding that Mamba is still active and targeting organizations in the Middle East.

Evolution

Meantime, while the Philadelphia and Petya authors started out with targeted campaigns, their strategy eventually shifted. "Once ransomware goes global, it is not used as a targeted campaign. That's what happened with Philadelphia and Petya," Wheeler says.

Philadelphia targeted healthcare companies before it later become a commodity and was sold as a ransomware-as-a-service (RaaS), a situation similar to Petya, which initially targeted companies in Germany, explains Wheeler.

Defending against targeted or spray-and-pray ransomware attacks is similar: each require backing up data frequently, dedicating a team to analyze the organization's endpoint security and activity, and ensuring all control processes are in place on the network, Ivanov says.

"Targeted ransomware attacks will continue to evolve," Ivanov warns, so companies need to take steps to reduce the impact.

Related Content:

 

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15593
PUBLISHED: 2019-11-22
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
CVE-2019-16285
PUBLISHED: 2019-11-22
If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive.
CVE-2019-16286
PUBLISHED: 2019-11-22
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.
CVE-2019-16287
PUBLISHED: 2019-11-22
An attacker may be able to leverage the application filter bypass vulnerability to gain privileged access to create a file on the local file system whose presence puts the device in Administrative Mode, which will allow the attacker to executed commands with elevated privileges.
CVE-2019-18909
PUBLISHED: 2019-11-22
The VPN software within HP ThinPro does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with root privileges.