Eg Cryptolocker

Total Page:16

File Type:pdf, Size:1020Kb

Eg Cryptolocker Cyber Extortion July 18, 2014 A brief overview of the history of personal cyber extortion (e.g. CryptoLocker); current trends; strategies for both prevention and clean-up; and a pinch of prognosticating about future trends. For the latest version of this document go to https://MavenSecurity.com/resources Presented on July 18, 2014 at a joint meeting of ISACA Philadelphia and InfraGard Delaware. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 About the Author <PROPAGANDA> David Rhoades is a director with Maven Security Consulting Inc. (www.mavensecurity.com). Maven Security Consulting Inc. provides information security assessments and training, and is headquartered in Delaware (USA). David’s expertise includes web application security, network security architectures, and vulnerability assessments. Past customers have included domestic and international companies in various industries, as well as various US government agencies. David has been active in information security consulting since 1996, when he began his career with the computer security and telephony fraud group at Bell Communications Research (Bellcore). David teaches domestically and internationally at various security conferences, including Interop and others. David has a Bachelor of Science degree in Computer Engineering from the Pennsylvania State University (psu.edu). www.MavenSecurity.com </PROPAGANDA> Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 MTV: Nokia paid several million to extortionists to keep code secret | Yle Uutiset | yle.fi http://yle.fi/uutiset/mtv_nokia_paid_several_million_to_extortionists_to_keep_source_code_s ecret/7305200 Domino’s Pizza hacked, customer database held to ransom | Naked Security http://nakedsecurity.sophos.com/2014/06/16/dominos-pizza-hacked-customer-database-held- to-ransom/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 CodeSpace.com eventually figured out the attacker had access to their Amazon EC2 admin portal. They changed the password in hoping to kick out the attacker. However, the attacker anticipated this by creating secondary logins for the account, and upon seeing CodeSpaces.com's attempt to sever his access he decided to trash the data. Screenshot collection of Reveton as seen in numerous countries across the world: Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 https://www.botnets.fr/index.php/Reveton ChronoPay CEO was arrested June 23, 2011. June 22, 2011 The FBI (Operation Trident Tribunal) seized 22 computers and servers in the US that were put of a scareware scheme. The Security Service of Ukraine (SBU) seized at least 74 pieces of computer equipment and cash from a criminal group related to conficker and scareware. McAfee tracked a 60% decrease in fake AV infections between June and July 2011. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 "Liberty Reserve was a Costa Rica-based centralized digital currency service. In May 2013, Liberty Reserve was shut down by United States federal prosecutors under the Patriot Act after an investigation by authorities across 17 countries. …money laundering and operating an unlicensed financial transaction company." Source: Liberty Reserve - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Liberty_Reserve Eran Tromer. "Cryptanalysis of the Gpcode.ak ransomware virus" http://rump2008.cr.yp.to/6b53f0dad2c752ac2fd7cb80e8714a90.pdf ~ May 2008 PGPCoder or GPCode - encrypted files & demanded payment Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Stealing bank credentials and initiating unauthorized wire transfers has been all the rage in the past few years. The amounts documented in the press are staggering, and likely only the tip of the iceberg: http://krebsonsecurity.com/category/smallbizvictims/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 ‘Operation Tovar’ Targets ‘Gameover’ ZeuS Botnet, CryptoLocker Scourge — Krebs on Security http://krebsonsecurity.com/2014/06/operation-tovar-targets-gameover-zeus-botnet- cryptolocker-scourge/ FBI — U.S. Leads Multi-National Action Against GameOver Zeus Botnet and Cryptolocker Ransomware, Charges Botnet Administrator http://www.fbi.gov/news/pressrel/press- Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 releases/u.s.-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker- ransomware-charges-botnet-administrator USDOJ: OPA: Documents and Resources from the June 2, 2014 Announcement in U.S. v Evgeniy Mikhailovich Bogachev et al and Disruption of Gameover Zeus and Cryptolocker http://www.justice.gov/opa/gameover-zeus.html Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 http://www.justice.gov/opa/documents/dgzc/complaint.pdf A quick read about some of the capabilities of GameOver (GOZ) and a few sample victims. Page 4 section 15 lists some victims: Victims of the GOZ scheme to defraud and unauthorized interception include, among others: a. A composite materials company in the Western District of Pennsylvania, which lost more than after an unauthorized wire transfer was initiated its bank account using credentials stolen by the Defendants through the use of GOZ; b. An Indian tribe in Washington which lost more than $277,000 after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ; c. A corporation operating assisted living facilities in Eastern Pennsylvania, which lost more than after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ; d. A regional bank in Northern Florida, which lost nearly seven million dollars after an unauthorized wire transfer was initiated from its bank account using credentials stolen by the Defendants through the use of GOZ. Fast flux - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Fast_flux Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Some GameOver also sent via Blackhole and Magnitude exploit kits. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Image credit: CryptoLocker developers charge 10 bitcoins to use new Decryption Service - News http://www.bleepingcomputer.com/forums/t/512668/cryptolocker-developers-charge-10- bitcoins-to-use-new-decryption-service/ These current numbers are subject to change without notice. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Photo: Mjanja Tech | Great success! http://mjanja.co.ke/2013/09/backing-up-389- ldap/borat_great_success/ Software Restriction Policy has been a feature in Windows since 2001…time to start using it. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Bruteforcing the decryption is not practical Disconnect it from your wireless or wired network to prevent further encrypting of remote files. Do not remove the infection from the %AppData% folder if you want to pay the ransom. Check if shadow volumes still exist. You might be able to restore from them. Otherwise delete the Registry values and files; program will not load anymore. You can then restore your data via other methods. CryptoLocker spawns two processes of itself. Use Process Explorer and right click on the first process and select Kill Tree. This will terminate both at the same time. Details for various scenarios (e.g. restoring from Shadow Volumes, recovering Dropbox files, etc) http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware- information Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 There was also CryptoBit as of December 2013. It doesn't encrypt data fully, but corrupts the first 512 bytes of the every file, and supposedly encrypts the original 512 bytes somewhere. It also runs a cryptocoin miner on your system to earn the attacker some virtual currency. CryptorBit and HowDecrypt Information Guide and FAQ http://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Threatens negative online reviews; BBB complaints; harassing phone calls; fake delivery orders; phone DoS; vandalism; mercury contamination; Anonymous reports of health code violations, tax evasion, illegal drug sales, terrorist training camp. Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Pizza Joint Owners Being Extorted for Bitcoin Don't Know What Bitcoin Is - The Wire http://www.thewire.com/technology/2014/06/pizza-joints-extorted-for-bitcoin-dont-know- what-bitcoin-is/373710/ Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Copyright 2014 – www.MavenSecurity.com Cyber Extortion July 18, 2014 Of course you know about your OS and AV auto-updates. But they are not enough. You want to update all your software, since a flaw in any piece of installed software may be leveraged to compromise the system. Secunia Online Software Inspector (OSI) – online via browser https://secunia.com/vulnerability_scanning/online/ Secunia Personal Software Inspector (PSI) – install https://secunia.com/vulnerability_scanning/personal/
Recommended publications
  • Éric FREYSSINET Lutte Contre Les Botnets
    THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions.
    [Show full text]
  • Improved Detection for Advanced Polymorphic Malware James B
    Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2017 Improved Detection for Advanced Polymorphic Malware James B. Fraley Nova Southeastern University, [email protected] This document is a product of extensive research conducted at the Nova Southeastern University College of Engineering and Computing. For more information on research and degree programs at the NSU College of Engineering and Computing, please click here. Follow this and additional works at: https://nsuworks.nova.edu/gscis_etd Part of the Computer Sciences Commons Share Feedback About This Item NSUWorks Citation James B. Fraley. 2017. Improved Detection for Advanced Polymorphic Malware. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (1008) https://nsuworks.nova.edu/gscis_etd/1008. This Dissertation is brought to you by the College of Engineering and Computing at NSUWorks. It has been accepted for inclusion in CEC Theses and Dissertations by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Improved Detection for Advanced Polymorphic Malware by James B. Fraley A Dissertation Proposal submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Assurance College of Engineering and Computing Nova Southeastern University 2017 ii An Abstract of a Dissertation Submitted to Nova Southeastern University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Improved Detection for Advanced Polymorphic Malware by James B. Fraley May 2017 Malicious Software (malware) attacks across the internet are increasing at an alarming rate. Cyber-attacks have become increasingly more sophisticated and targeted. These targeted attacks are aimed at compromising networks, stealing personal financial information and removing sensitive data or disrupting operations.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control
    International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705 A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control Jinal P. Tailor Ashish D. Patel Department of Information Technology Department of Information Technology Shri S’ad Vidya Mandal Institute of Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, Gujarat, India Bharuch, Gujarat, India Abstract – Ransomware is a type of malware that prevents or advertisements, blocking service, disable keyboard or spying restricts user from accessing their system, either by locking the on user activities. It locks the system or encrypts the data system's screen or by locking the users' files in the system unless leaving victims unable to help to make a payment and a ransom is paid. More modern ransomware families, sometimes it also threatens the user to expose sensitive individually categorize as crypto-ransomware, encrypt certain information to the public if payment is not done[1]. file types on infected systems and forces users to pay the ransom through online payment methods to get a decrypt key. The In case of windows, from figure 1 it shown that there are analysis shows that there has been a significant improvement in some main stages that every crypto family goes through. Each encryption techniques used by ransomware. The careful analysis variant gets into victim’s machine via any malicious website, of ransomware behavior can produce an effective detection email attachment or any malicious link and progress from system that significantly reduces the amount of victim data loss. there. Index Terms – Ransomware attack, Security, Detection, Prevention.
    [Show full text]
  • TCP SYN-ACK) to Spoofed IP Addresses
    Joint Japan-India Workshop on Cyber Security and Services/Applications for M2M and Fourteenth GISFI Standardization Series Meeting How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research Executive Director, Distinguished Researcher, NICT Information Security Fellow, KDDI Outline of NICT Mission As the sole national research institute in the information and communications field, we as NICT will strive to advance national technologies and contribute to national policies in the field, by promoting our own research and development and by cooperating with and supporting outside parties. Collaboration between Industry, Academic Institutions and Government R&D carried out by NICT’s researchers Budget (FY 2012): approx. 31.45 Billion Yen (420 Million US$) Personnel: 849 Researchers: 517 PhDs: 410 R&D assistance (as of April 2012) to industry and life convenient Japan Standard Time and academia Space Weather Forecast services Forecast Weather Space of the global community community global the of Growth of Economy of Japanese Growth Promotion of ICT a more for Security and Safety businesses Interaction with National ICT Policy problems major solve to Contribution 2 Internet Security Days 2012 Network Security Research Institute Collabor • Cyber attack monitoring, tracking, • Dynamic and optimal deployment of ation security functions analysis, response and prevention New GenerationNetwork Security • Prompt promotion of outcomes • Secure new generation network design Security Cybersecurity Architecture Laboratory Security Organizations Laboratory Daisuke Inoue Shin’ichiro Matsuo Kazumasa Taira Koji Nakao (Director General) (Distinguished Researcher) Security • Security evaluation of cryptography Fundamentals • Practical security • Post quantum cryptography Laboratory • Quantum security Shiho Moriai Recommendations for Cryptographic Algorithms and Key Lengths to Japan e-Government and SDOs 3 Internet Security Days 2012 Content for Today • Current Security Threats (e.g.
    [Show full text]
  • Understanding Ransomware in the Enterprise
    Understanding Ransomware in the Enterprise By SentinelOne Contents Introduction ��������������������������������������������������������������������������������������� 3 Understanding the Ransomware Threat ��������������������������������������������� 4 Methods of Infection �����������������������������������������������������������������������������������������������������4 Common, Prevalent and Historic Ransomware Examples �������������������������������������������6 The Ransomware as a Service (RaaS) Model �������������������������������������������������������������11 The Ransomware “Kill Chain” �������������������������������������������������������������������������������������14 Planning for a Ransomware Incident ����������������������������������������������� 16 Incident Response Policy �������������������������������������������������������������������������������������������16 Recruitment �����������������������������������������������������������������������������������������������������������������18 Define Roles and Responsibilities ������������������������������������������������������������������������������18 Create a Communication Plan ������������������������������������������������������������������������������������18 Test your Incident Response Plan ������������������������������������������������������������������������������18 Review and Understand Policies ��������������������������������������������������������������������������������18 Responding to a Ransomware Incident ��������������������������������������������
    [Show full text]
  • Cert-IST 2008 Flaws and Attacks Review
    Cert-IST 2008 flaws and attacks review 1) Introduction Every year, the Cert-IST makes a review of the past year. The goal is to cover the major events of 2008 in order to highlight the trends regarding attacks and threats evolution. This summary presents a synthesis of the information sent to Cert-IST adherents members during months through the Cert-IST bulletins, on which we go through on this occasion. Some figures In 2008 the Cert-IST released 563 new security advisories and monitored their evolution through 1330 updates (among which 82 major updates). The raw advisory production was therefore slightly decreasing compared to the year 2007 (595 advisories) being still higher than the previous years (546 advisories in 2006, 485 in 2005, etc.). On these 563 vulnerabilities, 13 moved towards very dangerous situations and have been monitored in a specific way through the Cert-IST "Crisis Response Hub". At the end, the Cert-IST issued 2 alerts for threats of maximum risk that required an immediate treatment inside our constituency: • The CERT-IST/AL-2008.001 alert in July for the DNS vulnerability • The CERT-IST/AL-2008.002 alert in November for the Conficker (Downadup) worm Globally, the Cert-IST monitors vulnerabilities regarding approximately 739 products and 6194 product versions. Major events First of all, let’s review the major trends of the year 2008 : • Workstation attacks through compromised web sites. The beginning of the year clearly showed an increase of the attacks targeting the user. More than the web browser or the operating system, it is rather vulnerabilities discovered in third-party software (QuickTime, Acrobat Reader, Real Media, Flash) which are used to compromise the user’s system during Internet browsing.
    [Show full text]
  • Creative Commons BY-NC-ND
    BY-NC-ND Commons Creative cybercriminalite.book Page V Jeudi, 14. septembre 2006 8:25 20 Creative Commons BY-NC-ND Table des matières Avant-propos . IX Chapitre 1 – Internet : le nouveau filon des organisations criminelles . 1 1.1 Une exploitation professionnelle de la cybercriminalité . 2 1.2 Des pertes estimées en million d’euros . 6 Chapitre 2 – Les maillons faibles de la sécurité informatique . 13 2.1 L’internaute et l’ingénierie sociale . 14 2.1.1 L’ingénierie sociale . 14 2.1.2 La phase de renseignements . 16 2.1.3 Quelques exemples . 19 2.1.4 Comment lutter contre l'ingénierie sociale . 22 2.2 Les failles de sécurité logicielles . 23 2.2.1 L’attaque Scob/Padodor . 25 2.2.2 L’attaque GDI+ . 26 2.2.3 Les attaques du protocole Bluetooth . 27 Chapitre 3 – Vols et pertes de données personnelles . 29 3.1 DonnÉes personnelles : pertes et profits . 29 3.2 Les pertes de données sensibles . 31 3.3 Le vol des données : le marché aux puces . 32 cybercriminalite.book Page VI Jeudi, 14. septembre 2006 8:25 20 Creative Commons BY-NC-ND VI Cybercriminalité Chapitre 4 – Le phishing : l’approche artisanale . 39 4.1 Introduction . 40 4.2 Les techniques du phishing . 42 4.2.1 Comment harponner la victime . 43 4.3 Les mécanismes d’attaques . 47 4.3.1 Attaque par le milieu . 48 4.3.2 Obfuscation d’URL . 49 4.4 Les différentes protections . 52 Chapitre 5 – Le phishing : l’approche industrielle . 55 5.1 Le pharming . 55 5.1.1 L’attaque par empoisonnement du cache DNS et le pharming.
    [Show full text]
  • THE RANSOMWARE REVOLUTION: HOW EMERGING ENCRYPTION TECHNOLOGIES CREATED a PRODIGIOUS CYBER THREAT Matthew S. Ryan BA, MA
    THE RANSOMWARE REVOLUTION: HOW EMERGING ENCRYPTION TECHNOLOGIES CREATED A PRODIGIOUS CYBER THREAT Matthew S. Ryan BA, MA, MPICT, MCSSD This thesis is submitted in partial fulfilment for the degree of Doctor of Cyber Security School of Engineering and Information Technology, The University of New South Wales at the Australian Defence Force Academy 20 December 2019 Surname : Ryan Given Name : Matthew Abbreviation for degree : DCybSec - Doctor of Cyber Security (Research) Faculty : UNSW Canberra School : Engineering and Information Technology (SEIT) The ransomware revolution: how emerging encryption technologies created a Thesis Title : prodigious cyber threat Abstract The increasing public availability of encryption technologies, and the parallel emergence of cryptocurrencies, have elevated ransomware to become the most prodigious cyber threat that enterprises now confront. The advent of cryptocurrencies provided the catalyst for increased profitability from ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This thesis is among the first academic works to analyse what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013. This threat is compounded by a disconnect between academia, the professional services industry, and vendors. This research brings together two strands of analysis. First, it documents the emergence of encryption-centric technologies that have created an environment conducive to undertaking this type of cyber-attack. The ease of public access to advanced encryption techniques has allowed malicious actors to operate with increased anonymity across the internet. This has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks.
    [Show full text]
  • Comparative Analysis of Various Ransomware Virii
    J Comput Virol (2010) 6:77–90 DOI 10.1007/s11416-008-0092-2 EICAR 2008 EXTENDED VERSION Comparative analysis of various ransomware virii Alexandre Gazet Received: 20 January 2008 / Revised: 6 June 2008 / Accepted: 12 June 2008 / Published online: 4 July 2008 © Springer-Verlag France 2008 Abstract The word ransomware and the associated phe- payment in exchange for a stolen functionality”. Most wide- nomenon appeared something like 3 years ago, around the spread ransomwares make an intensive use of file encryption year 2005. It shed light on a specific class of malwares which as an extortion mean. We are actually dealing with an aspect demand a payment in exchange for a stolen functionality. of blackmailing applied to information technologies field. In Most widespread ransomwares make an intensive use of file a naive but simple approach, one may argue that blackmail encryption as an extortion mean. Basically, they encrypt var- reliability resides in the strength of the extortion mean. Actu- ious files on victim’s hard drives before asking for a ransom ally, one would immediately completes this proposition and to get the files decrypted. Security related media and some says in the perception victims have of this extortion mean. antivirus vendors quickly brandished this “new” type of vir- Ransomwares have been used for mass extortion, being wild- ii as a major threat for computer world. This article tries to spread to many users. Is the extortion scheme reliable? May investigate the foundation of these threats beyond the phe- few resources and reverse-engineering allow to break it? Do nomenon.
    [Show full text]
  • Pandalabs Annual Report 2012 Summary 01 Introduction
    PandaLabs annual Report 2012 Summary 01 Introduction 02 2012 at a glance - Mobile Phone Malware - Ransomware: “Police Virus” - Social Networks - Mac - Cyber-crime - Cyber-war 03 2012 in figures 04 2013 Security Trends 05 Conclusion 06 About PandaLabs Introduction 01| Introduction The year 2012 has come to an end, and it is time to take a look back and analyze everything that has happened in the security world over the last twelve months. Malware creation showed no sign of slowing down, as shown by the fact that in 2012 we detected a record-high 27 million new malware strains at the laboratory, at an average of 74,000 new samples per day. In addition, cyber-attacks against multinational corporations continued to increase, with victims ranging from companies in the video game industry (Blizzard) to auto giants (Nissan). We also analyze the most important events in the mobile phone industry. As Android’s market share continues to grow, the motivation for cyber-crooks to target the platform also increases. The report also covers how social media (Facebook especially) was used by cyber-criminals to spread malware by making use of social engineering techniques. Furthermore, we take a look at the largest Mac infection to date and its consequences. 2012 has seen some remarkable events in the cyber-war/cyber-espionage arena, with Flame grabbing headlines. We analyze this and other attacks that took place in the Middle East. Summing up, this report recaps the major computer security events that occurred in 2012, and forecasts future trends for 2013. Sit back and enjoy! 2012 at a glance 02| 2012 at a glance As Android market share continues to grow, so does the amount of malware targeting the platform.
    [Show full text]
  • Lutte Contre Les Botnets : Analyse Et Stratégie Eric Freyssinet
    Lutte contre les botnets : analyse et stratégie Eric Freyssinet To cite this version: Eric Freyssinet. Lutte contre les botnets : analyse et stratégie. Cryptographie et sécurité [cs.CR]. Université Pierre et Marie Curie - Paris VI, 2015. Français. NNT : 2015PA066390. tel-01231974v3 HAL Id: tel-01231974 https://tel.archives-ouvertes.fr/tel-01231974v3 Submitted on 15 Feb 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, Supélec Rennes Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M.
    [Show full text]