Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
After SamSam, Ryuk Shows Targeted Ransomware is Still Evolving
#1
Quote:Last month the world learned that the FBI thinks it has identified the two people behind the notorious SamSam ransomware attacks.

SamSam, you may recall, gained notoriety for plundering ransoms from vulnerable targets like hospitals, and for devastating attacks like the one that embattled the City of Atlanta in early 2018. As with other targeted attacks, SamSam was deployed manually after its operators had broken into a vulnerable network via a poorly-protected RDP port. The SamSam gang’s methodical and patient attacks put them in a position to extort enormous ransoms, and helped them accrue almost $7 million since December 2015. As you might expect, things have been a bit quiet from SamSam since the FBI’s indictment. The Iranian suspects are beyond the agency’s reach, but they have been identified, their operation has been compromised and, for the time being at least, activities have ceased. The unmasking followed a period of apparently diminishing returns for SamSam attacks. After the publication of extensive research by Sophos in August, SamSam’s monthly earnings began to decline, even while the frequency of attacks seemed to increase. Now SamSam seems to have left the stage, but the brand of destructive, stealthy attacks it exemplified didn’t start with SamSam and they didn’t end with it either. In fact, while SamSam may have gained infamy, other kinds of targeted ransomware, like Dharma and BitPaymer, have been deployed more widely, and demanded higher ransoms. The threat of targeted ransomware is undimmed, and continues to evolve. In August 2018, just as SamSam’s influence begun to diminish, a new strain of targeted ransomware appeared. Ryuk.

Ryuk, named after a character in the manga series Death Note, represents an evolution in ransomware that’s either learning from, building on, stealing from, or paying homage to the targeted malware that’s gone before. Targeted ransomware of all stripes seems to have converged on a method that, sadly, just works and Ryuk follows it too. The attackers:
  1. Enter the victim’s network via a weak RDP (Remote Desktop Protocol) password.
  2. Escalate their privileges until they’re an administrator.
  3. Uses their privileged position to overcome security software.
  4. Spread their ransomware as widely as possible before encrypting the victim’s files.
  5. Leave notes demanding payment in return for decrypting the files.
  6. Waits for the victim to contact them via email.
Hackers using targeted ransomware work hard to achieve administrator access because it allows their software to cause so much damage – enough that many victims have no option but to pay five- or six-figure ransoms.
https://nakedsecurity.sophos.com/2018/12...-evolving/
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Eugene Kaspersky Targeted attack on our management with the Triangulation Trojan. mrtrout 0 494 06-02-2023 , 03:59 AM
Last Post: mrtrout
  Kaspersky’s Advanced Targeted Threat Predictions For 2022 mrtrout 0 581 11-16-2021 , 02:55 AM
Last Post: mrtrout
  Russian orgs heavily targeted by smaller tier ransomware gangs mrtrout 0 528 10-11-2021 , 10:09 PM
Last Post: mrtrout
  Windows 10 targeted by PuzzleMaker hackers using Chrome zero-days mrtrout 0 783 06-08-2021 , 10:08 PM
Last Post: mrtrout
  German Parliament targeted again by Russian state hackers mrtrout 0 869 03-27-2021 , 03:40 AM
Last Post: mrtrout

Forum Jump:


Users browsing this thread: 1 Guest(s)