CyberheistNews Vol 6 #13 [ALERT] Last Week Was A Ransomware Horror Show. Here Is The Roundup!



CyberHeist News CyberheistNews Vol 6 #13
[ALERT] Last Week Was A Ransomware Horror Show. Here Is The Roundup!
Stu Sjouwerman


Guys, last week the news about ransomware just kept coming like a Tsunami. There are new troubling developments in this rotten ransomware racket. I have been blogging furiously just to keep up with this epidemic. I'm giving you the highlights here, and you can grab any blog posts if you want more detail about a certain strain or development. Here goes:

TeamViewer Denies It Is "Negotiated Ransomware" Infection Vector


A modified version of EDA2, an open source ransomware strain developed by Turkish computer engineering student Utku Sen, --by the way, thanks Utku, that was a very smart idea-- has been encrypting files and appending the .surprise extension to them. The cybercriminals using the Surprise ransomware have chosen an unusual infection vector: the popular remote control tool TeamViewer.

Apparently these bad guys are not counting on the "spray-and-pray" approach, but are doing this partly in person, and the amount depends on how important the locked data is. It may range from 0.5 BTC to as much as 25 BTC (that is 10,000 dollars!). These terms are to be negotiated individually. OUCH. More:
https://blog.knowbe4.com/teamviewer-denies-it-is-ransomware-infection-vector

New PETYA Ransomware Locks Users Out By Overwriting Master Boot Record


Security researchers at Trend Micro have found a new type of ransomware that doesn’t encrypt specific files but makes the entire hard drive inaccessible. The malware has been named Petya and targets mainly companies.

As if encrypting files and holding them hostage is not enough, cybercriminals who create and spread crypto-ransomware are now resorting to causing blue screen of death (BSoD) and putting their ransom notes at system startup—as in, even before the operating system loads. Imagine turning on your computer and instead of the usual Windows icon loading, you get a flashing red and white screen with a skull-and-crossbones. Here is what it looks like:
https://blog.knowbe4.com/petya-ransomware-lock-users-out-by-overwriting-master-boot-record

Fileless Ransomware Strain Written In
Windows PowerShell


A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including health care organizations. The initial ransom is ~500 dollars, but it goes up to ~1,000 dollars after a couple of weeks.

The new ransomware program, dubbed PowerWare, was discovered by researchers from security firm Carbon Black and is being distributed to victims via phishing emails containing Word documents with malicious macros, an increasingly common attack technique. The fileless malicious code is hard to spot since PowerShell has been part of Windows for quite a while:
https://blog.knowbe4.com/new-ransomware-written-in-windows-powershell

Survey: 62% Of Companies Lack Confidence In Ability To Confront Ransomware Threat


Tripwire just published a new study which suggests that a majority of businesses might not be adequately prepared to either prevent or fully recover from ransomware infections. They announced the results of a survey of 200 security professionals who attended RSA Conference 2016:
https://blog.knowbe4.com/survey-62-of-companies-lack-confidence-in-ability-to-confront-ransomware-threat

New Maktub Ransomware Strain - Beautiful
And Dangerous


Maktub Locker is the name of a new Russian strain of ransomware. The word Maktub is Arabic for "fate", suggesting it is inevitable you will get infected with ransomware. The code was put together by professionals with extensive experience in writing malicious code.

At the moment, the strain is spread via email with a .scr attachment that pretends to be a document with a Terms-Of-Service update. The social engineering tricks are also professional grade. When the user opens the document, it really displays a fake TOS update in .rtf format. However, in the background, their files are being encrypted.

What To Do About It

Suddenly, the low cost for effective security awareness training comes into perspective as a key piece of the puzzle to manage the ongoing problem of social engineering.

Obviously you also need a lot of technical controls in place to block ransomware, and here are some excellent suggestions from Steve Ragan at CSO. MORE:
https://blog.knowbe4.com/new-maktub-ransomware-strain-beautiful-and-dangerous

Hospital Ransomware Attacks Surge; So Now What?


Ransomware attacks against hospitals are becoming commonplace this year, with at least five incidents revealed in recent weeks:
http://www.healthcareinfosecurity.com/hospital-ransomware-attacks-surge-so-now-what-a-8987

Certified Ethical Hacker Website Spreading TeslaCrypt


Irony strikes. The website of a New Mexico-based security certification provider EC-Council which administers certified ethical hacker qualifications has reportedly been spreading TeslaCrypt ransomware via Angler exploit kits:
http://www.scmagazine.com/irony-strikes-certified-ethical-hacker-website-reportedly-spreading-ransomware-for-days/article/485578/

Credit Union Times: Locky Ransomware Infects 90,000 Systems Daily


Ransomware is quickly becoming a mainstream form of malware, according to the Tampa Bay-based cybersecurity firm KnowBe4, and one driving factor is the significant amount of cash being racked up by the notorious Dridex banking Trojan gang with its new Locky strain.

Locky was linked to the Russian Dridex gang by IT security companies Proofpoint and Palo Alto Networks as the most prominent form of operating banking malware, replacing former front-runner CryptoWall.
http://www.cutimes.com/2016/03/18/locky-ransomware-infecting-90000-systems-daily

Warm Regards,
Stu Sjouwerman

Quotes Of The Week


"The gift of fantasy has meant more to me than my talent for absorbing positive knowledge."
- Albert Einstein

"You can't depend on your eyes when your imagination is out of focus."- Mark Twain


Thanks for reading CyberheistNews

Security News
Some Positive News To Balance The Bad Stuff


This story was submitted to Reddit 2 weeks ago by GeekyWan, a Sysadmin & HIPAA Officer.

"I figured I would share this here to illustrate the importance of testing your employee's knowledge with IT security. For the last several weeks, in the company-wide IT weekly email, I have been talking about phishing and what to look for and do if a phishing email arrives. The plan was, after providing a steady stream of information about phishing, to use KnowBe4's complimentary phishing security test to see if the word got through their heads.

On Wednesday morning, at about 10:30am, I pulled the trigger and over the next hour I was bombarded with people asking if a) the breach was real (the test phishing email says there was a security breach) and b) what should they do about it. In all, about 80% of my office either asked about it or deleted the message.

Sadly 20% of the office failed the test and clicked the link. I sent a company-wide email to follow-up about the phishing test, using the results as a learning opportunity.

Then, about 24 hours later, I got a phone call from someone asking if I was re-testing the office (I wasn't) and they forwarded me a real phishing email! In the email was a link actually went to an infected website that had a CryptoLocker on it (kids, don't try this at home without a good isolated sandbox).

I was able to turn this into another learning opportunity, several people in the office had also gotten the real phishing email, and so yet another email went out to all the staff to illustrate how dangerous these phish emails really are.

Since Thursday, I've had several positive emails from staff and doctors thanking me for the education about phishing and how because of this near-miss they will be extra vigilant from now on. I do plan on continuing to educate and use moments like these as learning opportunities for my staff. The best protection is only as good as the end user."

We agree GeekyWan!

Here is where anyone can get their complimentary Phishing Security Test and do the same experiment:
https://www.knowbe4.com/phishing-security-test-offer

InfoSec World 2016 Conference & Expo
- April 4-6, 2016


InfoSec World 2016 is less a week away! Join MISTI and 1,000+ of your peers from around the globe at this 2 ½ day conference featuring 100 industry experts who will share hands-on, practical advice on a range of security topics. From understanding your adversary to learning about the zero-day exploit market to bridging the gap between security and the business, InfoSec World 2016 will offer an opportunity for security professionals to learn something new and test ideas with peers.

Join us in Orlando to increase your information security knowledge, and help the security community get one step closer to unlocking security's message at Disney’s Contemporary Resort:
http://www.infosecworld.misti.com/

Phishing Attacks Targeting W-2 Data Hit 41 Organizations In Q1 2016


Steve Ragan at CSO was able to dig up 41 organizations that fell for the recent W-2 scams. That means in reality there are many hundreds of them. PhishLabs did some research and came to find that this is the new Nigerian 419 scam, and that is where most of these attacks are coming from. Here's the CSO article with the List of Shame, because all that could have been prevented with effective security awareness training:
http://www.csoonline.com/article/3048263/security/phishing-attacks-targeting-w-2-data-hit-41-organizations-in-q1-2016.html


Cyberheist 'FAVE' LINKS:
This Week's Links We Like, Tips, Hints And Fun Stuff





Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews