Eg Cryptolocker
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Extortion July 18, 2014 A brief overview of the history of personal cyber extortion (e.g. CryptoLocker); current trends; strategies for both prevention and clean-up; and a pinch of prognosticating about future trends. For the latest version of this document go to https://MavenSecurity.com/resources Presented on July 18, 2014 at a joint meeting of ISACA Philadelphia and InfraGard Delaware. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 About the Author <PROPAGANDA> David Rhoades is a director with Maven Security Consulting Inc. (www.mavensecurity.com). Maven Security Consulting Inc. provides information security assessments and training, and is headquartered in Delaware (USA). David’s expertise includes web application security, network security architectures, and vulnerability assessments. Past customers have included domestic and international companies in various industries, as well as various US government agencies. David has been active in information security consulting since 1996, when he began his career with the computer security and telephony fraud group at Bell Communications Research (Bellcore). David teaches domestically and internationally at various security conferences, including Interop and others. David has a Bachelor of Science degree in Computer Engineering from the Pennsylvania State University (psu.edu). www.MavenSecurity.com </PROPAGANDA> Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 MTV: Nokia paid several million to extortionists to keep code secret | Yle Uutiset | yle.fi http://yle.fi/uutiset/mtv_nokia_paid_several_million_to_extortionists_to_keep_source_code_s ecret/7305200 Domino’s Pizza hacked, customer database held to ransom | Naked Security http://nakedsecurity.sophos.com/2014/06/16/dominos-pizza-hacked-customer-database-held- to-ransom/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 CodeSpace.com eventually figured out the attacker had access to their Amazon EC2 admin portal. They changed the password in hoping to kick out the attacker. However, the attacker anticipated this by creating secondary logins for the account, and upon seeing CodeSpaces.com's attempt to sever his access he decided to trash the data. Screenshot collection of Reveton as seen in numerous countries across the world: Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 https://www.botnets.fr/index.php/Reveton ChronoPay CEO was arrested June 23, 2011. June 22, 2011 The FBI (Operation Trident Tribunal) seized 22 computers and servers in the US that were put of a scareware scheme. The Security Service of Ukraine (SBU) seized at least 74 pieces of computer equipment and cash from a criminal group related to conficker and scareware. McAfee tracked a 60% decrease in fake AV infections between June and July 2011. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 "Liberty Reserve was a Costa Rica-based centralized digital currency service. In May 2013, Liberty Reserve was shut down by United States federal prosecutors under the Patriot Act after an investigation by authorities across 17 countries. …money laundering and operating an unlicensed financial transaction company." Source: Liberty Reserve - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Liberty_Reserve Eran Tromer. "Cryptanalysis of the Gpcode.ak ransomware virus" http://rump2008.cr.yp.to/6b53f0dad2c752ac2fd7cb80e8714a90.pdf ~ May 2008 PGPCoder or GPCode - encrypted files & demanded payment Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Stealing bank credentials and initiating unauthorized wire transfers has been all the rage in the past few years. The amounts documented in the press are staggering, and likely only the tip of the iceberg: http://krebsonsecurity.com/category/smallbizvictims/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 ‘Operation Tovar’ Targets ‘Gameover’ ZeuS Botnet, CryptoLocker Scourge — Krebs on Security http://krebsonsecurity.com/2014/06/operation-tovar-targets-gameover-zeus-botnet- cryptolocker-scourge/ FBI — U.S. Leads Multi-National Action Against GameOver Zeus Botnet and Cryptolocker Ransomware, Charges Botnet Administrator http://www.fbi.gov/news/pressrel/press- Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 releases/u.s.-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker- ransomware-charges-botnet-administrator USDOJ: OPA: Documents and Resources from the June 2, 2014 Announcement in U.S. v Evgeniy Mikhailovich Bogachev et al and Disruption of Gameover Zeus and Cryptolocker http://www.justice.gov/opa/gameover-zeus.html Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 http://www.justice.gov/opa/documents/dgzc/complaint.pdf A quick read about some of the capabilities of GameOver (GOZ) and a few sample victims. Page 4 section 15 lists some victims: Victims of the GOZ scheme to defraud and unauthorized interception include, among others: a. A composite materials company in the Western District of Pennsylvania, which lost more than after an unauthorized wire transfer was initiated its bank account using credentials stolen by the Defendants through the use of GOZ; b. An Indian tribe in Washington which lost more than $277,000 after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ; c. A corporation operating assisted living facilities in Eastern Pennsylvania, which lost more than after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ; d. A regional bank in Northern Florida, which lost nearly seven million dollars after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ. Fast flux - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Fast_flux Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Some GameOver also sent via Blackhole and Magnitude exploit kits. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Image credit: CryptoLocker developers charge 10 bitcoins to use new Decryption Service - News http://www.bleepingcomputer.com/forums/t/512668/cryptolocker-developers-charge-10- bitcoins-to-use-new-decryption-service/ These current numbers are subject to change without notice. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Photo: Mjanja Tech | Great success! http://mjanja.co.ke/2013/09/backing-up-389- ldap/borat_great_success/ Software Restriction Policy has been a feature in Windows since 2001…time to start using it. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Bruteforcing the decryption is not practical Disconnect it from your wireless or wired network to prevent further encrypting of remote files. Do not remove the infection from the %AppData% folder if you want to pay the ransom. Check if shadow volumes still exist. You might be able to restore from them. Otherwise delete the Registry values and files; program will not load anymore. You can then restore your data via other methods. CryptoLocker spawns two processes of itself. Use Process Explorer and right click on the first process and select Kill Tree. This will terminate both at the same time. Details for various scenarios (e.g. restoring from Shadow Volumes, recovering Dropbox files, etc) http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware- information Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 There was also CryptoBit as of December 2013. It doesn't encrypt data fully, but corrupts the first 512 bytes of the every file, and supposedly encrypts the original 512 bytes somewhere. It also runs a cryptocoin miner on your system to earn the attacker some virtual currency. CryptorBit and HowDecrypt Information Guide and FAQ http://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Threatens negative online reviews; BBB complaints; harassing phone calls; fake delivery orders; phone DoS; vandalism; mercury contamination; Anonymous reports of health code violations, tax evasion, illegal drug sales, terrorist training camp. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Pizza Joint Owners Being Extorted for Bitcoin Don't Know What Bitcoin Is - The Wire http://www.thewire.com/technology/2014/06/pizza-joints-extorted-for-bitcoin-dont-know- what-bitcoin-is/373710/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Of course you know about your OS and AV auto-updates. But they are not enough. You want to update all your software, since a flaw in any piece of installed software may be leveraged to compromise the system. Secunia Online Software Inspector (OSI) – online via browser https://secunia.com/vulnerability_scanning/online/ Secunia Personal Software Inspector (PSI) – install https://secunia.com/vulnerability_scanning/personal/