EKANS Ransomware Attacks Focus on Disrupting Businesses Reliant Upon Industrial Control Systems



Conceptual digital image of lock on circuit background-2Leveraging knowledge of industrial control systems, this relatively new ransomware variant is looking to be as disruptive as possible to operations by killing processes and encrypting data.

The more the bad guys know about your environment, the more havoc they can cause – this is the point made by the latest variant of the EKANS (formerly SNAKE) ransomware. It’s ability to kill desired processes is the basis for attacks on any business reliant upon industrial control systems (ICS). Using what appears to be firsthand knowledge of these systems, EKANS looks to stop operations before encrypting data, effectively holding both the organization’s production and data for ransom.

This expansion of functionality beyond just simple encryption of data held for ransom is the latest trend with ransomware. From variants that hack Active Directory, to deleting backups, to lying dormant to reduce the effectiveness of recovery, to threatening to publish the data encrypted, ransomware creators are increasingly becoming savvy in finding new ways to ensure their ransom demands are met.

In the case of organizations with industrial control systems, there are a few specific actions that can assist with preventing an attack:

  • Update ICS endpoints – because it’s unlikely that an ICS-specific endpoint is going to have a user accessing their email on it, it stands to reason that these machines are being infected via lateral movement, which can be accomplished using known vulnerabilities. Ensure the latest OS is used and that these systems remain updated with the latest patches.
  • Leverage Endpoint Protection – the digital warfare is occurring at the process level. The bad guys are killing good guy processes. So, it’s time to do the same. Installing Endpoint Protection will help ensure no rogue/malicious processes can execute bad guy code, including ransomware.
  • Train Your Users – ransomware often enters via a phishing attack. Teaching users via Security Awareness Training to not engage with suspect or unusual emails is a solid first step in lowering the risk of successful attack.

The bad guys are going for the proverbial throat – they want to shut you down completely to improve the chances of them taking home a hefty ransom. A layered defense is the best strategy to protect the organization from what can be a complete operational disaster.


Topics: Ransomware



Subscribe To Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews