Ransomware How to Prevent a Crypto Crisis at Your IT Business
Total Page:16
File Type:pdf, Size:1020Kb
MARCH 2015 SPECIAL REPORT Ransomware How to prevent a crypto crisis at your IT business © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 INTRODUCTION What is Ransomware? Imagine you get to work and flip on your computer. You see a black screen that says all of your files are locked. Your documents, images, spreadsheets – you can’t open anything. The screen says you have 48 hours to pay $600 or you will never see your files again. Sound like a sensational movie plot? Unfortunately, this is real. This is ransomware. Ransomware is a type of malware that extorts money from victims. It does this by blocking access to an infected computer system and demanding a ransom payment to restore access. Ransomware recently became national news but it has been around for decades. Malware of this type dates back to 1989 with the AIDS trojan. AIDS hid file folders, encrypted file names, and claimed a software license on the victim’s machine had expired. A fee of $189 was required to “renew” the license and unlock the computer. This fee was paid by sending money to a post office box in Panama. Today, the main type of ransomware is called “crypto” ransomware. This threat restricts access to a computer system by encrypting victims’ files with strong, public key cryptography. A ransom is demanded to decrypt (i.e. unlock) the files. One of the most widely known variants of crypto-ransomware is Cryptolocker. After it rose to prominence in late 2013, Cryptolocker grabbed headlines by attacking government © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 What is Ransomware? (cont.) agencies, businesses, and private homes. Even local police departments, such as the one in Swansea, MA, had to pay a ransom to unlock their files. The original Cryptolocker is gone. It was isolated in a joint effort by law enforcement and the security community. Victims can even download decryption keys for free from www.decryptolocker. com. However, Cryptolocker has since been updated and replaced by newer and stronger variations. The popularity and effectiveness of Cryptolocker inspired criminals to launch hundreds of thousands – perhaps even millions – of similar types of ransomware. Today, new threats such as CryptoWall, CryptoForgress, TorrentLocker, CTB-locker, and many others continue to strong-arm money from victims. In this report you will learn: • How ransomware spreads • How infection progresses • Ransomware trends to come • How to prevent ransomware from harming you Note: This report was published in March 2015. Due to the raplidly evolving nature of malware, some of this information is subject to change. © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 How does ransomware spread? Malicious email attachments Email is the most common means of ransomware infection. The messages often arrive as notices for an invoice, voicemail, shipment, or other important, time-sensitive information. Infection typically begins when the user downloads and opens the email’s attachment. This affects both corporate email accounts and free personal accounts such as those offered by Gmail and Yahoo! Mail. Drive-by downloads Some ransomware variants are forced onto victims’ machines by drive-by downloads. This occurs when a victim visits a malicious website. Exploits are used to attack unpatched software on the victim’s machine and install the malware onto the system. Malvertising More recent ransomware variants have been found connected to advertisements on popular websites such as Yahoo!, AOL, The Atlantic, and Match.com. These ads sneak onto the sites through legitimate ad networks. Infection typically requires the victim to click on the ad. However, silent infections have occurred that required no interaction from the user. Removable drives Though less common, USB drives are another vector for some ransomware. The malware enters a machine once an infected drive is connected. In this case, the “drive” can also be a connected mobile device. © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 A typical infection scenario It is difficult to speak generally about ransomware. The number of variants and their constant change make it difficult to describe them as a whole. One cannot say, “this is how all ransomware works,” because the threat is not that simple. With that caveat, here is how infection typically progresses: • Infection begins with a “dropper” being installed on the victim’s machine. • The dropper downloads and installs the full malware package • The malware searches the local machine and all mapped drives to find targeted files (such a images, PDFs, word processor documents, and other important files types) • Communicating with a command-and-control server, often via the TOR anonymity network, the files are encrypted using strong public-key cryptography. • Victims are then notified that their files are locked. • A ransom is demanded, often from $100 to $600, to be paid in Bitcoins. • Instructions are provided on how to acquire Bitcoins and pay. • A deadline for the ransom payment is given, often from 48 to 96 hours. • If the ransom is not paid, the ransom will increase or the decryption key will be destroyed. If the key is destroyed, the files are all but impossible to unlock without restoring from backup. © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 Decryption is impossible Today’s ransomware typically locks files with 2048-bit RSA cryptography. The files can only be unlocked with a key that is stored on the ransomware’s control servers. Unlocking the files without the key is, for all practical purposes, impossible. Once infected, a victim’s only hope of restoring access to the locked files is to pay the ransom or restore files from backup. Paying the ransom is not advised. First, it only encourages criminal organizations to continue extorting people with malware. Second, it does not guarantee the files will be unlocked. The only responsible way to respond to a ransomware infection is to clean the system and restore files from backup. Backing up files and taking preventive measures are the best ways to combat this threat. Note: Some people were able to unlock files encrypted by Cryptolocker, the well-known strain of ransomware that was isolated in June 2014. This occurred because law enforcement and security professionals were able to seize the malware’s servers. Though a fortunate turn of events, this is not expected to happen with other ransomware variants and is not something one should count on. Prevention is a far better choice. © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 The threat is evolving Ransomware tactics continue to shift and improve as the months pass. Some variants allow victims to decrypt up to five files to “prove” that the malware can restore access. Others have increased ransoms from the equivalent of $24 to about $600. On the more technical side, they constantly improve their means of infecting systems and avoiding detection. The number of ransomware variants and infections is on an upward trend, showing no signs of slowing. How might the threat evolve in the coming months and years? Professor Alan Woodward of University of Surrey Department of Computing told Forbes that today’s criminal organizations may take a page out of an old playbook: “The next step might well be the modern equivalent of protection rackets – threatening companies with being either taken offline or having their databases frozen unless they pay a regular fee.” © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 How to avoid a crypto crisis Complete avoidance of malware is impossible. However, with the precautions listed in this section, organizations can greatly reduce their chances of infection and reduce the impact of an infection should one occur. Educate users The criminals who create ransomware and other malware are clever at thwarting security systems. They constantly refine their malicious emails and exploit kits to circumvent the latest means of stopping their crimes. Relying on technology alone to stop these actors is not enough. User education must be part of any program meant to prevent ransomware. A few areas to focus on: • Highlight the warning signs of suspicious emails and suspicious websites • Teach the importance of software and network hygiene. Demonstrate the need for regular patching and policy review. • Encourage users to separate their personal web use from their professional web use. Personal web browsing should not be conducted at work. • To encourage compliance and support, explain why business networks and systems must be restricted. Not having administrative rights to one’s computer can be irritating, but if the person understands why this is necessary then it’s much easier to support the effort and follow along. © 2015 Calyptix Security Corporation. All rights reserved. I [email protected] I (800) 650 – 8930 How to avoid a crypto crisis (cont.) Patch, patch, patch Malware exploits weaknesses found in systems and software. The vendors of these systems eventually release patches to fix the vulnerabilities. However, the patches often have to be applied manually. So it is essential to regularly check for updates and apply them to stay secure. Always maintain the latest versions of your firewall, antivirus, operating systems, applications, and other systems. Routinely update as new patches become available, and update automatically if possible. Filter malicious email As mentioned earlier, ransomware primarily spreads through malicious email attachments. Some infections begin with a “.scr” file that arrives in a “.zip” or “.cab” email attachment, according to Société Générale CERT. Be sure to filter all incoming emails for content and attachments before they reach the end user.