Ransomware As a Service

Ransomware As a Service

EXECUTIVE SERIES Ransomware as a Service Cybercrime-as-a-Service Series Cybercrime as a service (CaaS) is an important trend in Deep Web forums because it puts cybercriminal tools and services in the hands of a wider range of threat actors—even the nontechnical, such that anyone can become a cybercriminal with minimal investment. At the same time, cybercriminals are now seeing the advantages of expanding their targets from home users to larger enterprise networks. This is a matter that IT administrators need to be ready for. Ransomware as a Service Ransomware1 use one of the more chilling widespread cybercrime models today. Victims get ransomware through the Internet and ! ! Spam Botnet Ransomware Bulletproof Spam Botnet Ransomware Bulletproof once installed, they hold victims’ documents hostage in exchange hosting, etc. hosting, etc. for money. PEDDLERS PEDDLERS The fear factor works. In 2015, CryptoWall operators raked in US$325 million from individuals and businesses worldwide through this modus operandi. Several ransomware families continue to do Ransomware Operator RaaS Operator so today. Ransomware Ransomware Ransomware Operator A Operator B Operator C Hollywood Presbyterian paid Victims US$17,000 to decrypt files encrypted by Locky. Victims Victims Victims Once exclusively a home user problem, ransomware’s social engineering tactics and technical capabilities have since evolved Figure 2. In RaaS, the operator gets a cut from each victim’s payment, resulting in more potential profit than from the to dip into enterprise networks as well. We confirmed this through traditional ransomware business model. the increase in focus of crypto-ransomware on office-related documents such as database files, web pages, SQL files, and other file types not typically found on home computers. 14% Web Pages 10% Tax Return 52% Files Database-Related Files 19% 5% Mac OS X SQL Files Files Figure 1. An increasing number of crypto-ransomware families Figure 3. We saw several cybercriminal underground forum posts have been seen encrypting file types typically seen in enterprise advertising RaaS, some even offering a full lifetime license for only networks. US$39. In an expected but disturbing turn, ransomware are now being This trend further pushed ransomware into the mainstream. sold in Deep Web forums as a service (ransomware as a service Based on our monitoring, ransomware families already hit a 172% [RaaS]), meaning anyone, even with basic technical know-how, increase in the first half of 2016 alone2, compared to the whole can launch his own ransomware campaign. 2015. CYBERCRIME AS A SERVICE SERIES: RANSOMWARE AS A SERVICE • Page 1 of 3 Figure 4. In the first six months of 2016 alone, we saw 79 new ransomware families. What It Means for Enterprises This means, now more than ever, that any file in digital form is at risk, • Regulatory penalties whether it’s a top-secret formula for a pharmaceutical company; • Damage to the company’s brand and reputation a list of high-profile contacts for a sales company; or a normal system file that is mission-critical to a hospital, a nuclear plant, or an The danger is not expected to stop anytime soon. Ransomware Industrial Control System (ICS) operation. Ransomware can affect a continue to grow in complexity, devising new ways to evade company’s bottom line, either directly or indirectly, as manifested in: detection and impede cleanup and recovery. Our analysis of recent ransomware families affecting enterprises show an uptick in • Lost sales technical modifications that make it more challenging for security • Payment, delivery, or transaction delays vendors to detect and clean up after ransomware binaries. • Unfulfilled orders • Business process disruption Should enterprises pay the ransom? • Productivity losses Kansas Heart Hospital paid the hackers, but the hackers did not restore full access to its files. • Legal fines Instead, they demanded a second payment. HIGH WALTRIX/CryptXXX uses a cocktail of evasion-and-arrival techniques like WALTRIX/ using the Angler Exploit Kit, legitimate CRYPTXXX/ EXXROUTE services, and fast-changing binaries, CERBER LOCKY among others. Other recent arrival methods include: • SURPRISE arrives via Remote OCT 2015 - JAN 2016 PETYA Desktop Control software FEB 2016 • PETYA arrives as a job application TESLACRYPT MAR - APR 2016 to HR with a link to a “resume” MAY 2016 Other recent ransomware behaviors POWERWARE/POWERSHELL CRYPTRITU/RANSOM32 JUN - JUL 2016 observed: • CRYPSAM/Samsam and PAYCRYPT KIMCILWARE exploit vulnerable PGPCODER CRYPJOKER Web servers LEVEL OF DIFFICULTY TO CLEAN UP AND RECOVER FROM CLEAN UP AND RECOVER TO OF DIFFICULTY LEVEL KIMCILWARE RADAMANT ZCRYPT • PETYA overwrites the Master Boot COVERT GOOPIC HYDRACRYPT LECTOOL SAMSAM Record, causing BSoD SALAM SURPRISE XORBAT • CERBER disables Windows Startup JIGSAW ZUQUITACHE/ EMPER FAKBEN Repair CRYPTOHASU CRYPSHOCKER MEMEKAP LEVEL OF DIFFICULTY TO DETECT/BLOCK LOW HIGH Figure 5. Detection and cleanup matrix for ransomware known to target enterprises CYBERCRIME AS A SERVICE SERIES: RANSOMWARE AS A SERVICE • Page 2 of 3 Ransomware Solutions Network defenders are expected to employ best practices against ransomware, including multilayered protection, data backup3 and Blocked via Email recovery strategies, access control, timely patching, and employee Reputation education, without compromising business productivity. 95.83% Trend Micro understands the value of analyzing the entire ransomware attack chain—from entry points such as malicious Blocked via Web URLs and spam and the use of exploits and various evasion Reputation techniques to the ransomware’s phone-home communication back 2.08% to operators—and strengthening the ability to block ransomware before they execute on systems. Blocked via File Furthermore, as network defenders scale up to protect hundreds Reputation to thousands of endpoints, the different layers of protection must 0.14% be able to “talk to each other,” forming a connected threat defense strategy. All layers must have access to threat intelligence, security Blocked via Behavior updates, and protection afforded by security technologies like: Monitoring for Known Threats • Advanced anti-malware (beyond blacklisting) 1.23% • Antispam at the Web and messaging gateways • Web reputation Blocked via Behavior Monitoring for • Application control (whitelisting) ? Unknown Threats 0.0004% • Content filtering • Vulnerability shielding Figure 6. Typical distribution of ransomware detection by vector- • Mobile app reputation specific security technology • Intrusion prevention A majority of today’s threats can be detected by the aforementioned • Host-based firewall protection techniques working together, but ransomware are guaranteed to evolve, so enterprises must finally be able to catch zero-day and “unknown” threats through behavior and integrity monitoring as well as sandboxing. References: 1 http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-101-what-it-is-and-how-it-works 2 http://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/the-reign-of-ransomware 3 http://blog.trendmicro.com/trendlabs-security-intelligence/world-backup-day-the-3-2-1-rule/ ©2016 by Trend Micro Incorporated. All rights reserved. Trend Micro, and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. CYBERCRIME AS A SERVICE SERIES: RANSOMWARE AS A SERVICE • Page 3 of 3.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us