CyberheistNews Vol 6 #35 |
Heads-Up! Voice Message Notification Email Warning Could Be Ransomware |
Don't play voice mail messages from suspicious sources. Xavier Mertens at the SANS Internet Storm Center had a great item that we have been warning against for a while now.
He started out with: "Bad guys need to constantly find new ways to lure their victims. If billing notifications were very common for a while, not all people in a company are working with such kind of documents. Which types of notification do they have in common? All of them have a phone number and with modern communication channels... everybody can receive a mail with a voice mail notification. Even residential systems can deliver voice message notifications."
One of the currently most prevalent ransomware strains called Cerber has even experimented with text-to-speech synthesizers to threaten victims to pay the ransom.
This new voice mail attack email arrives with an attachment, which supposedly contains a voice message, in a .wav file compressed in .zip folder. The folder actually contains hidden malicious code that will install ransomware and renames files to [original file name].crypted.
The delivery mechanism may be exploiting the fact that missed call notification emails are enabled by default in Microsoft Outlook.
Consumers appear to be the first target of this ransomware campaign according to Mertens. The initial phishing attack campaign contained a voice message regarding a modem from Vigor, a UK distributor of ADSL modems for the residential market.
As we all know, the bad guys use the UK as a beta test for their attacks, and debug the whole campaign before they unleash it on the U.S. So use this as a heads-up and alert your users that they need to watch out.
I recommend you send your employees, friends and family something like this, you're welcome to copy/paste/edit:
"Bad guys have found a new way to trick people into infecting their PC with ransomware. This time it looks like a Microsoft email that tells you about a voice mail that was left for you, and wants you to play the voice mail.
The email has an .zip attachment that supposedly has the voice mail message in a .wav file. However, if you unzip the file, the ransomware will encrypt all the files on your computer and possibly all files on the network if you have access. You only get your files back if you pay around 500 dollars.
Do not click on links in "voice mail" emails from someone you do not know, and certainly do not open any attachments!
Remember, Think Before You Click!
Here is the blog post with a screenshot, showing how this looks: https://blog.knowbe4.com/heads-up-voice-message-notification-email-warning-could-be-ransomware
|
The 10 Fastest Growing Cybersecurity Companies Right Now |
CRN observed an interesting development in growth of cyber security:
"Cybersecurity is one of the fastest growing, if not the fastest growing, area of IT right now. With that comes an incredible opportunity for growth for vendor startups and solution providers alike. This year's INC 5000 list recognized the companies that are making the most of that opportunity, with growth rates up to 7,613 percent over the past three years.
What's exciting for the channel is that nearly half of the top ten fastest growing companies in the market were solution providers, showing the opportunity is ripe for partners to capitalize on cybersecurity."
Take a look at who made the list. It goes from 10 to 1 and you will find yours truly at #2: http://www.crn.com/slide-shows/security/300081779/the-10-fastest-growing-cybersecurity-companies-right-now.htm
|
5 Security Practices That Hackers Say Make Their Lives Harder |
Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.
At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Here are the measures:
- Limit admin access to systems
- Protect privileged account passwords
- Extend IT security awareness training
- Limit unknown applications
- Protect user passwords with security best practices
Full article with detailed explanation for each point at CIO Magazine: http://www.cio.com/article/3112740/security/5-security-practices-hackers-say-make-their-lives-harder.html
|
Here Is A Real DDoS Plus Ransomware Extortion Attack |
One of our customers received a clear extortion attempt with a threat of execution of a combined DDoS and Cerber ransomware attack against them. These bad guys claim to be the Armada Collective, but the original gang was arrested and are no longer in the running.
However, there are copycats that have taken the Armada approach, and are sending this type of extortion emails to people. The KnowBe4 blog has the details. You have to start asking yourself if you would pay or not and start buying Bitcoin just in case: https://blog.knowbe4.com/here-is-a-real-ddos-plus-ransomware-extortion-attack
|
New Locky Ransomware Version Out In The Wild |
A new version of Locky ransomware has been spotted now featuring an improved delivery mechanism and better obfuscation which combined make it more difficult for anti-malware products to spot.
Maharlito Aquino, a researcher with Cyren said these changes to Locky, first detected on August 23, are just the latest in a string discovered so far this summer indicating the cybergang developing Locky is not resting on its laurels.
Like earlier versions of Locky, this one uses emails socially engineered to attract those working in the financial sector that contain a zip attachment containing the attack.
Aquino stated that recent Locky versions drop DLL files on infected computers, instead of EXE files. The rest of the infection chain remains as we know it.
Locky sends phishing emails to your employees that have a ZIP file attached to the email body. If a user unzips the attachment, it drops a JavaScript file, which when executed downloads the DLL file.
Next, the DLL is injected into a process, and its malicious code executed which in turn starts the file encryption operation. Another new feature is that this DLL file uses a custom packer to prevent anti-malware scanners to detect it.
This strain locks files and appends the .zepto extension at the end, meaning this a version of the Zepto ransomware which is just a Locky OEM.
Also, in the last two weeks, three new open source ransomware strains have emerged, which are based on Hidden Tear and EDA2. These new ransomware families specifically look for files related to web servers and databases, which suggests they are specifically targeting businesses.
Both Hidden Tear and EDA2 are considered as the first open source ransomware created for educational purposes. However, these were quickly abused by cybercriminals.
And then there is the Bleepingcomputer roundup this week, with 10 stories, 6 new ransomware strains, a decryptor and much more: http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-26-2016-cows-wildfire-locker-locky-and-more/
|
Warm Regards, Stu Sjouwerman |
|
|
|