Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/23/2019
04:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

'Anatova' Emerges as Potentially Major New Ransomware Threat

Modular design, ability to infect network shares make the malware dangerous, McAfee says.

A new and potentially dangerous ransomware sample has been spotted infecting computers in the United States and at least nine other countries so far.

McAfee, the first to discover the emerging menace, has dubbed it Anatova, based on a name in the ransom note the malware leaves behind on infected systems.

In an advisory Tuesday, the security vendor described Anatova as having the potential to become a serious threat based on its obfuscation capabilities and ability to infect network shares. The malware also has a modular design, which allows attackers to add new malicious functions to it in the future.

Researchers from McAfee first discovered Anatova on a private peer-to-peer network, but they are still unsure of all the other ways the malware is being distributed. The malicious software typically has been using the icon of a game or application to trick users into downloading it on their systems.

Once executed, Anatova takes a variety of actions to avoid detection and ensure it can find and encrypt as many files as possible on an infected system. The malware then leaves behind a note demanding the equivalent of $700 in ransom for the key to decrypt the data.

"Anatova makes a few checks to make sure it is not run in a sandbox and the victim is not from certain countries," says Christiaan Beek, lead scientist at McAfee. Users from former Soviet bloc nations and some other countries, including Syria, Iraq, and India, are currently not under threat from the new ransomware strain.

Once it has gone past the initial checks, the malware looks for files that are smaller than 1 MB but makes sure not to disrupt the operating system while doing so. It also checks for network shares and will try to encrypt files in those locations. "One infection can disrupt a large part of an enterprise," Beek warns.

Significantly, each Anatova sample has its own key, meaning there's no master key available that could decrypt all files for all victims. Each victim would need a specific, separate key in order to unlock encrypted files, he explains.

After encrypting, the ransom note is written to the system. "It will then clean the memory so no keys can be dumped and [then] overwrites the backup files — volume shadow copies – 10 times to make sure that no backup of local files is possible," Beek notes. Anatova's modular design gives malware authors a way to add capabilities that would allow the malware to be distributed over the network or change its behavior while running.

Anatova is another sign that the ransomare threat is far from over, though there appears to be some uncertainty over whether the number of attacks are growing or declining. Kaspersky Lab, for instance, in December estimated that attacks involving crypto-ransomware had increased 43% in 2018 compared with the year before. But others have noted a decrease in ransomware attacks matched by a corresponding increase in attacks involving banking Trojans and cryptomining tools.

Regardless of the way the attacks are trending, most security researchers concur that ransomware continues to present a major threat for organizations. Last year numerous organization suffered major disruptions and financial losses from ransomware attacks, including The City of Atlanta, Port of San Diego, electronic health record provider Allscripts, and Hancock Health.

"Ransomware is a still a threat we have to take seriously," Beek says. "Be prepared, and do not pay. Paying will keep this business model alive."

According to McAfee, the developers and actors behind Anatova appear to be skilled malware authors. Though researchers at the company have a few theories on who is behind the new threat, it's still too early to jump to conclusions, Beek says. "We believe this was a prototype being tested and has a potential to become a serious threat," he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  7/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13951
PUBLISHED: 2019-07-18
The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data.
CVE-2019-13952
PUBLISHED: 2019-07-18
The set_ipv6() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
CVE-2019-10100
PUBLISHED: 2019-07-18
The Sleuth Kit 4.6.0 and earlier is affected by: Integer Overflow. The impact is: Opening crafted disk image triggers crash in tsk/fs/hfs_dent.c:237. The component is: Overflow in fls tool used on HFS image. Bug is in tsk/fs/hfs.c file in function hfs_cat_traverse() in lines: 952, 1062. The attack v...
CVE-2019-10102
PUBLISHED: 2019-07-18
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt (https://github.com/saltstack/salt/blob/devel...
CVE-2019-10102
PUBLISHED: 2019-07-18
Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically ...