Wannacry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attacking from Inside
WIPER MALWARE: ATTACKING FROM INSIDE Why some attackers are choosing to get in, delete files, and get out, rather than try to reap financial benefit from their malware. AUTHORED BY VITOR VENTURA WITH CONTRIBUTIONS FROM MARTIN LEE EXECUTIVE SUMMARY from system impact. Some wipers will destroy systems, but not necessarily the data. On the In a digital era when everything and everyone other hand, there are wipers that will destroy is connected, malicious actors have the perfect data, but will not affect the systems. One cannot space to perform their activities. During the past determine which kind has the biggest impact, few years, organizations have suffered several because those impacts are specific to each kinds of attacks that arrived in many shapes organization and the specific context in which and forms. But none have been more impactful the attack occurs. However, an attacker with the than wiper attacks. Attackers who deploy wiper capability to perform one could perform the other. malware have a singular purpose of destroying or disrupting systems and/or data. The defense against these attacks often falls back to the basics. By having certain Unlike malware that holds data for ransom protections in place — a tested cyber security (ransomware), when a malicious actor decides incident response plan, a risk-based patch to use a wiper in their activities, there is no management program, a tested and cyber direct financial motivation. For businesses, this security-aware business continuity plan, often is the worst kind of attack, since there is and network and user segmentation on top no expectation of data recovery. -
Gothic Panda Possibly Used Doublepulsar a Year Before The
Memo 17/05/2019 - TLP:WHITE Gothic Panda possibly used DoublePulsar a year before the Shadow Brokers leak Reference: Memo [190517-1] Date: 17/05/2019 - Version: 1.0 Keywords: APT, DoublePulsar, China, US, Equation Group Sources: Publicly available sources Key Points Gothic Panda may have used an Equation Group tool at least one year before the Shadow Brokers leak. It is unknown how the threat group obtained the tool. This is a good example of a threat actor re-using cyber weapons that were originally fielded by another group. Summary According research conducted by Symantec, the Chinese threat actor known as Gothic Panda (APT3, UPS, SSL Beast, Clandestine Fox, Pirpi, TG-0110, Buckeye, G0022, APT3) had access to at least one NSA-associated Equation Group tool a year before they were leaked by the Shadow Brokers threat actor. On April 14, 2017, a threat actor called the Shadow Brokers released a bundle of cyber-attack tools purportedly coming from the US NSA, also referred to as the Equation Group. Among the released material there was the DoublePulsar backdoor implant tool, which was used alongside EternalBlue in the May 2017 destructive WannaCry attack. DoublePulsar is a memory-based kernel malware that allows perpetrators to run arbitrary shellcode payloads on the target system. It does not write anything on the hard drive and will thus disappear once the victim machine is rebooted. Its only purpose is to enable dropping other malware or executables in the system. According to Symantec, Gothic Panda used the DoublePulsar exploit as early as in 2016, a full year before the Shadow Brokers release. -
Chrome Flaw Allows Sites to Secretly Record Audio
Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Sounds really scary! Isn’t it? But this scenario is not only possible but is hell easy to accomplish.A UX design flaw in the Google’s Chrome browser could allow malicious websites to record audio or video without alerting the user or giving any visual indication that the user is being spied on. AOL developer Ran Bar-Zik reported the vulnerability to Google on April 10, 2017, but the tech giant declined to consider this vulnerability a valid security issue, which means that there is no official patch on the way. How Browsers Works With Camera & Microphone Before jumping onto vulnerability details, you first need to know that web browser based audio-video communication relies on WebRTC (Web Real-Time Communications) protocol – a collection of communications protocols that is being supported by most modern web browsers to enable real-time communication over peer-to-peer connections without the use of plugins. However, to protect unauthorised streaming of audio and video without user’s permission, the web browser first request users to explicitly allow websites to use WebRTC and access device camera/microphone. Once granted, the website will have access to your camera and microphone forever until you manually revoke WebRTC permissions. In order to prevent ‘authorised’ websites from secretly recording your audio or video stream, web browsers indicate their users when any audio or video is being recorded. « Activating this API will alert the user that the audio or video from one of the devices is being captured, » Bar-Zik wrote on a Medium blog post. -
Bluekeep Update 12/05/2019
BlueKeep Update 12/05/2019 Report #: 201912051000 Agenda • What is BlueKeep • Timeline of BlueKeep • BlueKeep Today • Initial Attempts to Exploit BlueKeep • Why Initial Attempts Failed • BlueKeep Tomorrow • Mitigations • Indicators of Compromise (IOCs) • HC3 Contact Information • References Slides Key: Non-Technical: managerial, strategic and high-level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) TLP: WHITE, ID# 201912051000 2 What is BlueKeep • BlueKeep (CVE-2019-0708) • Vulnerability in Microsoft’s (MS) Remote Desktop Protocol • Grants hackers full remote access and code execution on unpatched machines • No user interaction required • Essential owns the machine, malicious actor can do as they please • Affects: Windows XP, 7, Server 2003, Server 2008, and Server 2008 R2 • Deja Blue(Related BlueKeep Vulnerabilities) affects: Windows 8, 10, and all older windows versions • EternalBlue affects: Server Message Block version 1 (SMBv1) • “Wormable” meaning it has the ability to self propagate (think WannaCry level of damage) • MS, NSA, DHS, many other security vendors released advisories and warning on this exploit TLP: WHITE, ID# 201912051000 3 BlueKeep Timeline Metasploit Team Microsoft Released Patch: DHS Tested a Working BlueKeep Scanner Significant Uptick in Releases BlueKeep Coin Miner Exploit CVE-2019-0708 Exploit Against W2000 Discovered in Malicious RDP Activity Exploit Module BlueKeep Vulnerability Watchdog Malware 34 Days (Private Exploit) 70 Days (Semi-Public Exploit) 115 Days (Public -
Threat Landscape Report – 1St Quarter 2018
TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018. -
EY Technical Intelligence Analysis
“Petya ” Ransomware Attack Technical intelligence analysis June 2017 Executive summary On 27 June 2017, a global ransomware attack campaign called Petya (also being called “NotPetya”, and “Petna”) impacted companies across a wide range of sectors including financial services, power and utilities, media, telecom, life sciences, transportation as well as government agencies. While organizations in countries around the world were affected - including the United States, Netherlands, France, India, Spain and Russia - Ukraine seems to have been the first and hardest country hit by the attack due to the use of an auto-update feature of M.E.Doc software required for tax calculation by any company operating in the Ukraine. The ransomware successfully infected several of its banks as well as media outlets, energy companies, government agencies, airports and radiation monitoring equipment within the Chernobyl power plant. It is the second major ransomware event in as many months after the WannaCry outbreak in May 2017. Although initially characterized as very similar to that attack, Petya is notably different, particularly in the way it spreads and encrypts victims’ data. While WannaCry relied on its worm-like behavior to spread across the Internet, Petya was less virulent, and spread internally using a number of lateral movement techniques including the SMB vulnerability and credential harvesting. Once inside the network, Petya is more sophisticated and nefarious than WannaCry. It subsequently leverages several additional hacking tools to gather credentials from the infected computer’s memory, before spreading to other machines using legitimate and well-known Windows system administration tools such as PsExec and WMIC. It does this for about an hour before rebooting and encrypting the system and/or the files. -
Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of Wannacry for Network and Information Security
ZAMBIA INFORMATION COMMUNICATION TECHNOLOGY (ICT) JOURNAL Volume 1 (Issue 1) (2017) Pages 35-40 Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security Aaron Zimba1,2 Luckson Simukonda2, Mumbi Chishimba2 Department of Computer Science and Technology Department of Computer Science and Information University of Science and Technology Beijing1 Technology Beijing, China Mulungushi University2 [email protected] Kabwe, Zambia {thezo1992, chishimba.mumbi}@gmail.com Abstract— Encryption has protected the Internet for some time attacks is that of extortion, making the victim’s data now and it has come to raise user trust on the otherwise inaccessible via encryption until a ransom demand is met. The unsecure Internet. However, recent years have seen the use of tragedy of ransomware is that it employs the most robust and robust encryption as stepping stone for cyber-criminal resilient forms of encryption making it computationally activities. Ransomware has not escaped the headlines even as it infeasible [4] to decrypt a victim’s data without consented has attacked almost every sector of the society using a myriad of efforts of distributed computing. WannaCry, one of the infection vectors. Mission critical data has been held to ransom devastating ransomware attacks which plagued over 150 and victims have had to part away with millions of dollars. The countries and traversed all continents [5] in May of 2017, advent of the anonymous Bitcoin network has made matters spared no industry niche owing to the indiscriminate nature of worse where it’s been virtually infeasible to trace the the attack. It attacked universities, transport sector, health perpetrators. -
Analyzing Wannacry Ransomware Considering the Weapons and Exploits
ICACT Transactions on Advanced Communications Technology (TACT) Vol. 7, Issue 2, March 2018 1098 Analyzing WannaCry Ransomware Considering the Weapons and Exploits Da-Yu KAO*, Shou-Ching HSIAO**, Raylin TSO*** *Department of Information Management, Central Police University, Taoyuan City 333, Taiwan **Haishan Precinct, New Taipei City Police Department, New Taipei City 220, Taiwan ***Department of Computer Science, National Chengchi University, Taipei 116, Taiwan [email protected], [email protected], [email protected] attacks continue to target out-of-date systems as the recent Abstract— As ransomware has increased in popularity, its WannaCry ransomware (also known as WCry, WannaCrypt, creators are using our fears to their advantage. The rapid WannaCrpyt0r, or WannaCrpytor) has spread in a tragic proliferation of ransomware attacks indicates the growing scenario containing thousands of computers [5, 10]. The tendency of ransomware-as-a-service (RaaS) and the integration emergence of malware creation tools has facilitated the of hacking weapons. This paper presents the analysis of the creation of new variations of the existing ransomware [1]. infamous WannaCry ransomware, which is one of the most Ransomware can easily to modify its ability to propagate propagated and damaging malware in 2017. The anatomy of ransomware attacks is discussed to understand the multi-phased quickly [10]. The dark web is a repository of the hacking execution of WannaCry, including the deployment, installation, weapons. By installing the TOR (The Onion Router) browser, destruction, and command-and-control. The chain of criminals can access the dark web to realize their intentions of WannaCry’s execution comprises several hacking weapon conducting ransomware attacks, which requires only a few components. -
Cb Defense Ransomware Efficacy Assessment
Efficacy Assessment of Cb Defense Against Ransomware September 2017 Table of Contents 1 Executive Summary .................................................................................................................. 3 1.1 Test results ........................................................................................................................................ 3 2 Introduction.............................................................................................................................. 5 2.1 Structure of this report ..................................................................................................................... 5 2.2 Overview ........................................................................................................................................... 5 2.3 Ransomware as a business model .................................................................................................... 6 3 Ransomware families in scope .................................................................................................. 7 4 Detailed Results ........................................................................................................................ 9 5 Methodology .......................................................................................................................... 11 5.1 Infection methods ........................................................................................................................... 11 5.2 Result interpretation ...................................................................................................................... -
Cyber Securitymay 2019
Cyber Security Vol. 4 | IssueNEWS 5 May 2019 Page 2 | Page 3 | Page 4 | Page 5 | More News | Reader Articles | Challenge | Closing Welcome to the TXDPS Cyber Newsletter Hello everyone and welcome to this month’s cybersecurity newsletter. I hope you find this month’s newsletter relevant and interesting. Before you start reading the articles, I want to take a few minutes and talk about a problem one of our users noti- fied me about. He has had several phishing attempts to his DPS cell phone. This is actually known as Vishing but it works ex- actly the same way as Phishing, just via a phone instead of through email. Phishing and Vishing are both forms of Social Engi- neering. For those who don’t remember what Social Engineering is from previous newsletters, or maybe this is the first time you have heard the term, Social Engineering is a non-technical hacking technique. It is the use of deception to manipulate indi- viduals into divulging confidential or personal information that may be used for fraudulent purposes. Social Engineering is probably the most dangerous form of hacking because it does not require any technical expertise. All it requires is the individu- al be personable and able to convince the victim to divulge information without the victim realizing they are doing so. Many techniques are used to do this but the most common is to try to scare the victim and convince them they need to provide the in- formation being requested. Unlike email phishing scams, vishing isn’t easy to prevent. -
Wannacry Ransomware Campaign Exploiting SMB Vulnerability
CERT-EU Security Advisory 2017-012 WannaCry Ransomware Campaign Exploiting SMB Vulnerability May 22, 2017 — v1.6 History: • 12/05/2017 — v1.0: Initial publication • 13/05/2017 — v1.1: Additional information about ways to defend and new patches added • 15/05/2017 — v1.2: Additional variants discovered and a new tool published • 15/05/2017 — v1.3: Some wording changed • 16/05/2017 — v1.4: Additional variants with new killswitches discovered • 18/05/2017 — v1.5: Encryption key recovery sometimes possible • 22/05/2017 — v1.6: Better tool available for recovering encrypted files; other campaigns identified Summary A large ransomware campaign has been observed since Friday, May 12th, 2017. The payload delivered is a variant of ransomware malware called WannaCry. It appears to infect computers through a recent SMB vulnerability in Microsoft Windows operating system [1, 2, 3, 7, 12, 13] (CVE-2017-0145). The exploit used – EternalBlue – has been made available on the Internet through the Shadow- Brokers dump on April 14th, 2017 [6], but already earlier patched by Microsoft on March 14th, 2017 as part of MS17-010 [3] for the supported versions of the Microsoft Windows operating system. Unfortunately, the patch was not available at that time for legacy Windows XP, Windows 8, as well as for Windows Server 2003 systems. Even in case of systems where the patch was available, it appears that many organizations have not installed it. There were more than 200 000 computers affected world-wide with some prominent organizations including Telefonica [4] in Spain and NHS hospitals in UK [5]. As of May 13th, 2017, due to the seriousness of the threat, Microsoft has made available the patch MS17-010 [9] also for earlier (no longer supported) versions of Microsoft Windows operating system, such as Windows XP, Windows 8, and Windows Server 2003. -
SMB Vulnerabilities in Healthcare 11/05/2020
SMB Vulnerabilities in Healthcare 11/05/2020 TLP: WHITE, ID#202011051030 Invulnerable The Wall of Constantinople Mehmed II 27 foot Bronze Cannons VS Your Network EternalBlue with SMBv1 Protocol TLP: WHITE, ID#202011051030 2 Agenda • SMB Overview • SMB Vulnerabilities • SMB Exploitation and its Effects • SMB and Healthcare • SMB Identification Methods • SMB Remediation • Summary • References Slides Key: Non-Technical: Managerial, strategic and high- level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) TLP: WHITE, ID#202011051030 3 SMB Overview Server Message Block (SMB) is an enhanced version of CIFS (Common Internet File System) done by Microsoft for the release of Windows 95 in the early 1990s. Due to CIFS challenges with security, slow file transfer, and taking a lot of time responding to service requests and responses, SMB was developed. Image source: Educba TLP: WHITE, ID#202011051030 4 SMB Overview SMB is a client-server interaction protocol where clients request a file and the server provides it to the client. SMB gives users the ability to create, modify and delete shared files, folders, and printer access within the network. - Printers - Scanners - File system PORT 445 PORT 139 - Serial Port SMB runs directly over TCP (port 445) or over NetBIOS (usually port 139, rarely port 137 or 138). TLP: WHITE, ID#202011051030 5 SMB Overview 1984 SMBv1.0: Very similar to the CIFS protocol that shares the files over a network to access them among the clients in an effective way. SMB was initially introduced to run on top of NetBIOS and TCP/IP interface. *Version is the most vulnerable.