CyberheistNews Vol 6 #23 |
[ALERT] 93% Of Phishing Attacks Now Have Ransomware Payloads |
Oh boy. Things have gone from bad to worse in an awful hurry.
I remember the first time I reported on ransomware in the CyberheistNews Issue Feb 11, 2014, where an attorney's office file server was encrypted due to an employee opening an infected phishing attachment. I have to give him credit, the man bravely stepped forward to explain this problem to the world on TV.
Fast forward to June 1, 2016 and CSO has an article about a Phishme report which reveals a whopping 93 percent of all phishing emails contain ransomware. To make matters worse, endpoint security tools are not catching up with the now more than 100 different ransomware strains.
CSO's Maria Korolov summarized the report with the following: "That was up from 56 percent in December, and less than 10 percent every other month of last year. And the number of phishing emails hit 6.3 million in the first quarter of this year, a 789 percent increase over the last quarter of 2015."
Soft Targeting
She continued with: "In addition to the spike in the number of ransomware emails, one variant that's seeing increasing popularity is the "soft targeted" phishing message. It's somewhere between a business compromise email or spearphishing attack, which is targeted at one specific executive, and the general-purpose spam email that goes out to everybody. The soft targeted phishing email targets people in a particular job category, but may include some customization, such as the name of the recipient in the salutation.
"This has been a creeping trend for a while now," said Brendan Griffin, Threat Intelligence Manager at PhishMe. For example, a popular type of phishing email is the resume email, which supposedly has a resume from a job applicant in the attachment.
Recipients who don't work in human resources or other jobs where they hire people would either ignore it, or forward it on to the appropriate person at the company. Other job functions can be targeted as well. Other common types of soft targeted phishing emails are billing, shipping and invoice-related messages."
Asymmetric Warfare
The term "soft targeting" is adapted from asymmetric warfare where guerrilla forces or terrorists attack civilians -- often in other areas -- as opposed to attacking the military opposing force. I think the term applies in cyberwarfare as well, and is an apt description of what the bad guys are doing.
It's Here. Mass Customized Spear Phishing
I have been warning in many of these issues that with the emergence of a well-developed internet underground economy and sophisticated criminal bad actors this was inevitable. I'm surprised it has not happened any earlier, and this is only the beginning. Since practically everyone's personal, confidential data has been hacked and a large part of your work history is available through LinkedIn, it's easy to merge-purge databases and send highly targeted spoofed phishing attacks.
Can Your Domain Be Spoofed?
Are you aware that one of the first things hackers try is to see if they can spoof the email address of someone in your own domain? If so, they can launch a "CEO fraud" spear phishing attack on your organization, supposedly coming from Human Resources, the CEO or perhaps the mail room, and social engineer your users to click on a link.
That type of attack is very hard to defend against, unless your users are highly ‘security awareness’ trained.
Would you like to know if hackers can spoof your domain? KnowBe4 can help you find out if this is the case with our complimentary Domain Spoof Test. It's quick, easy and often a shocking discovery.
Get your complimentary domain spoof test now. https://info.knowbe4.com/domain-spoof-test-eb
|
Scam Of The Week: FBI Warns Against Email Extortion |
Your employees are being attacked both in and outside the office. This new email extortion scam can hit in both places, so it makes sense to warn them about this ahead of time and prevent a variety of trouble.
The FBI’s Internet Crime Complaint Center (IC3) warned that e-mail extortion campaigns have heated up in recent weeks.
The IC3 said the recent uptick in email extortion comes from the data breaches at organizations like Ashley Madison, the IRS, Anthem, and many others where millions of records with (sometimes highly) personal information have been stolen.
With extortion e-mail scams, attempted victims are told that if a ransom is not paid, their personal information like name, phone number, address, credit card data, and other confidential details will be "outed" to all the victim's social media contacts, family, and friends.
The recipient is instructed to pay in Bitcoin, and are typically given a short deadline. The ransom amount ranges from 2 to 5 bitcoins, which amounts to about 400 to 1,500 dollars depending on the exchange rates.
Here is some copy at the KnowBe4 blog I recommend you send in an email to your employees. You're welcome to copy/paste/edit: https://blog.knowbe4.com/scam-of-the-week-fbi-warns-against-email-extortion
|
This Week's Ransomware Roundup |
UltraDeCrypter Ransomware DOES NOT Decrypt Your Files
KnowBe4 gets regular calls from system admins who found us on the internet and are between a rock and a hard place. Backups failed and they have no way to revert to normal files. Worse, there is now a ransomware strain called UltraDeCrypter which simply does not deliver the unencryption routines after you pay. We have tried this twice, and two out of two they took the money and ran.
I'm sure that these crooks are incurring the wrath of the other criminal players in the ransomware racket, but in the meantime if you see this screen and have no backups, you are truly hosed. Here is what the ransomware looks like that does NOT post the decryption file once you pay. https://blog.knowbe4.com/ultradecryptor-ransomware-does-not-decrypt-your-files
BadBlock Will Encrypt Windows Executables And Brick Your Box
Another strain called BadBlock is so developed that it will not only encrypt your data files but also the executables on your machine. That means if the OS files are encrypted it no longer boots and you cannot make payments if the system is bricked.
The cybercriminals behind Badblock demand a ransom of 2 Bitcoin but victims can decrypt their files without paying, thanks to Emisoft’s security researcher Fabian Wosar. He has made a complimentary tool that is able to decrypt files encrypted by Badblock. More: http://www.myce.com/news/badblock-ransomware-damages-windows-wont-boot-anymore-79598/
Blackshades Ransomware Targets US, Russians And Taunts Researchers
Researchers who dig deep through the code of one of the latest strains of ransomware might be surprised and even a little irked at what they find. Hidden inside some of those strings of code are taunts aimed at them.
According to Lawrence Abrams who runs BleepingComputer.com, the malware, BlackShades Crypter a/k/a SilentShades was spotted late last month by a researcher that goes by the name Jack, targeting both users in the United States and Russia. http://www.bleepingcomputer.com/news/security/black-shades-ransomware-encrypts-your-pc-and-taunts-security-researchers/
Breaking Down A Powershell Ransomware - And Decrypting The Files
Interesting: Breaking down a PowerShell ransomware - and decrypting the files! The folks at VMRay tear apart a PowerShell ransomware strain that uses phishing email as an infection vector. Really interesting writeup. More: https://www.vmray.com/powershellransomwarepowerware/
|
Don’t Miss The June 8 Live Demo: New-School Security Awareness Training |
Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. Old-school security awareness training doesn’t hack it anymore. More than ever, your users are the weak link in your network security.
Join us on Wednesday, June 8, 2016, at 2:00 p.m. (EDT) for a 30-minute live product demonstration of the innovative Kevin Mitnick Security Awareness Training Platform to see the latest features and how easy it is to train and phish your users:
- Send Phishing Security Tests to your users and get your Phish-prone percentage.
- Roll out Training Campaigns for all users (or groups) with automated follow-up emails to “nudge” incomplete users, as well as point-of-failure training auto-enrollment.
- Advanced Reporting to watch your Phish-prone percentage drop, with great ROI.
- NEW EZXploit™ functionality that allows an internal, fully automated "human pentest”
- NEW USB Drive Test™ allows you to test your user’s reactions to unknown USBs found.
Find out how thousands of organizations have mobilized their end-users as their first line of defense. Register Now: https://attendee.gotowebinar.com/register/8234040645064891650
|
[INFOGRAPHIC] Don't Be The Victim Of A Cyberheist |
We have created a new infographic for your users, as part of your ongoing security awareness program. It's a good reminder how to stay safe online, and to keep their awareness levels at the appropriate level... HIGH!
You can attach this to an email, print it, make posters of it, or even fit the graphic in a screen saver. Downloads (Small and Large) here: https://blog.knowbe4.com/infographic-dont-be-the-victim-of-a-cyberheist
|
Warm Regards, Stu Sjouwerman |
|
|
|