Ransomware: Malware that kidnaps your data to extort money from you

Transcription

Ransomware: Malware that kidnaps your data to extort money from you
Ransomware: Malware that
kidnaps your data to extort
money from you
The type of malware from which you simply
can’t recover includes Cryptolocker, Cryptowall,
Reveton, Winlocker, FBI Virus, Moneypak, and
more.
June 2014
Table of Contents
Summary ................................................................................................................................................... 3
Holding you hostage ................................................................................................................................. 3
Cryptolocker .............................................................................................................................................. 4
What’s the Big Deal, I’ll Just Pay the Ransom ........................................................................................... 6
What Can I Do About It? ........................................................................................................................... 7
An Ounce of Prevention really is worth a Pound of Cure ......................................................................... 8
A Different Approach to Ransomware Protection .................................................................................... 8
Containment ......................................................................................................................................... 8
Detection............................................................................................................................................... 9
Prevention ............................................................................................................................................. 9
Intelligence ............................................................................................................................................ 9
Invincea Platform for User-Oriented Threats ........................................................................................... 9
Conclusion and more information .......................................................................................................... 10
Invincea, Inc.
3975 University Drive, Suite 460
Fairfax, VA 22030 USA
Tel: +1-855-511-5967
[email protected]
www.invincea.com
© 2014, Invincea, Inc. All rights reserved. Invincea, the Invincea Logo, Invincea FreeSpace, Invincea Management Service are trademarks of
Invincea, Inc. All other product or company names may be trademarks of their respective owners. All specifications are subject to change
without notice. Invincea assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this
document.
INV_WP_RANSOM_06162014
Page 2 of 10
Summary
Of all the classes of malware, “ransomware” may be the most
destructive because often it’s not possible to recover from its
negative effects.
While most malware is disruptive in nature (including general
nuisanceware, banking Trojans that steal financial data and
credentials, malware that targets information like intellectual
property, and those that turn your machines into bots to send out
spam campaigns), an organization can eventually recover from their
damage after significant cost, effort, and time.
Not so with ransomware – your important business data can be lost
forever.
Holding you hostage
Ransomware’s goal is to hold you hostage through a variety of lock-out mechanisms, the
most successful is by encrypting your data forcing you to pay for the decryption key.
The nature of this ransom can cause your data to be lost forever.
Since this malware can even encrypt your backup files across network share drives and
mounted file systems, if you lose your information without backups, it could cause
irreparable damage to your company.
Ransomware does not describe a specific infection mechanism but rather the impact on
the infected user. Ransomware can be distributed and infect targeted users through a
variety of infection mechanisms:
Page 3 of 10




Spear-phishing1 emails that deliver the employee to malicious websites that run
drive-by download exploits or include weaponized document attachments
Watering hole attacks2 that involve hijacking legitimate, trusted sites to push
malware to unsuspecting users
Poisoning search results3 behind trending news items on popular engines, such
as Google, Yahoo!, and Bing
Pushing malware4 through popular social networks such as Twitter and
Facebook
As recently as June 6, 2014, authors of the Cryptowall ransomware variant successfully
infected hundreds of thousands of users by paying to have malicious ads displayed on
popular websites like Facebook, Disney, and The Guardian5. Those websites were not
hacked to serve the malicious code, but distributed through legitimate advertising
networks.
Examples of common ransomware include Cryptolocker, Reveton6, Winlocker, FBI Virus,
and Moneypak Virus.
We’ll explore Cryptolocker, the most prevalent ransomware malware, in more detail.
Cryptolocker
Cryptolocker is the name of a malware family that infects end user computers via spearphishing email attacks posing as legitimate business correspondence from FedEx, UPS, a
bank or other trusted institutions, and from infected websites through watering hole
attacks and drive-by downloads.
1
http://www.invincea.com/spear-phishing-protection
http://www.invincea.com/watering-hole-attacks/
3 http://usatoday30.usatoday.com/tech/news/story/2012-06-17/poisoned-search-results/55654796/1
4 http://mashable.com/2013/04/22/twitter-malware-financial-fraud/
5 http://thehackernews.com/2014/06/new-cryptowall-ransomware-spreading.html
6 http://www.invincea.com/2013/03/kia-reveton-ransomware-java-7-exploit-cve-2013-0431
2
Page 4 of 10
Example of forged spear-phish email used to infect with Cryptolocker
When users get infected, the malware silently encrypts all documents on the local
machine and attempts to pivot and spread over mounted file systems, network shares,
USB drives, and other connected systems.
Once all files have been encrypted, Cryptolocker displays a dialog box describing what it
did to the user’s files along with details of the ransom. Files are encrypted with an
asymmetric 2,048-bit key – virtually impossible to crack. The only person that has the
key to unencrypt your files are the malware authors, and they will sell it to you: this is
the ransom payment.
Page 5 of 10
Cryptolocker dialog screen
By the time users get this message on their machine, it’s too late! Cryptolocker has
successfully encrypted all the data files on that user’s machine (and possibly across your
network). The average ransom amount is around $300, and the Cryptolocker authors
have started accepting Bitcoin for payment as this is not traceable by law enforcement.
The ransom must be paid within a specified period, often less than 96 hours, or the
unique private key that encrypted the files will be destroyed rendering your data
unrecoverable.
What’s the Big Deal, I’ll Just Pay the Ransom
As with most kidnapping crimes, paying the ransom is no guarantee that you will get
your key to recover your files. In some cases, the authors take your money and do not
respond. In others, they ask for more money since they know that you’re willing and
desperate to pay. There have also been documented cases where applying the
decryption key actually re-infects the user’s machines!
Surprisingly, it’s estimated that about 3% of impacted users pay the ransom, totaling to
just over $1M in ransom fees in the last three months of 2013 alone and $100M for all
ransomware variants since inception – certainly enough to encourage the Cryptolocker
authors to continue their ransomware campaigns.
Unfortunately, this type of crimes does pay… and pays well.
Page 6 of 10
What Can I Do About It?
Cryptolocker spread very quickly after it was first discovered in Sept 2013. It infected
over 250,000 machines in the first 100 days, mostly targeting small and medium
businesses in English-speaking countries. There are new variants of Cryptolocker being
created to spread its infection rate even wider and further reduce its ability to be
detected by traditional signature-based anti-virus systems.
Signature-based security requires that the anti-virus vendors have already discovered
the malware variant in order to write a signature, a classic chicken-and-the-egg
problem, resulting in a never-ending escalation of signatures and new exploits coming
out.
You can see from this analysis by VirusTotal.com (a free service that measures the
effectiveness rate of anti-virus scanners) that only 58% of anti-virus tools tested can
detect this single variant of Cryptolocker months after it was first introduced.
Organizations are taking a risk if they believe that legacy anti-virus technology can
detect modern malware.
VirusTotal.com detection results for a single Cryptolocker variant
Sadly, if you’re already infected, there’s not much you can do. (We are not
recommending whether you should pay the ransom or not.)
Hopefully, you have a good backup system in place that wasn’t impacted by the
infection, you were able to quickly identify and isolate that infected user, re-image their
machine to remove all traces of the malware, verify that other users haven’t been
infected, and start the painful processing of identifying the exposure to your lost data.
Page 7 of 10
An Ounce of Prevention really is worth a Pound of Cure
Invincea realized years ago after conducting advanced research on modern malware
activity that a new type of technology approach is needed to combat the explosive rise
in user-targeted threats, including spear-phishing, watering holes, drive-by downloads,
and other attacks of opportunities that spread ransomware and other malware.
There are over 200,000+ malware variants being released every day, plus over 60,000+
malicious URLs and hijacked websites are created each day that far outpaces the ability
of legacy signature-based anti-virus systems to keep up. There simply is too much
malware being created for anti-virus vendors to develop and release signatures every
minute of the day.
And what happens if the organization is not able to push new signatures to its users in a
timely manner? The user and the organization are at risk from malware like
Cryptolocker.
A Different Approach to Ransomware Protection
Invincea has taken a different approach to user protection based on over eight years of
advanced malware research, protecting nearly 15,000 organizations in 112 countries,
and single deployments as large as 70,000 endpoints.
It is not a single technology that is able to provide this capability, but rather an
innovative approach composed of multiple techniques operating in tandem to address
the problem domain.
Invincea offers an integrated platform providing mission-critical user protection,
enterprise scalable deployment and management, and real-time threat intelligence.
Containment
The core of the Invincea platform is the FreeSpace™ user protection client. This
software completely isolates vulnerable applications (Java, web browsers, PDF readers,
Microsoft Office suite, Adobe Flash, Adobe Reader, and more) from the host operating
system, registry, disk, running processes, threads, and memory into a secure virtual
container. One can think of this as “application virtualization.”
The containment allows for a unique capability: it doesn’t prevent vulnerable
applications from running (unlike application whitelisting), and lets them operate as
they normally do for legitimate uses. As applications are launched and run inside the
secure container, if they start to behave in a malicious manner, their activity does not
impact the host since all application executions occur in this segregated virtual
container fully isolated from the host.
The secure virtual container is an innovative approach as it allows for the integration of
behavioral activity scanners, forensics instrumentation, and user policy controls.
Page 8 of 10
Detection
The client component running on end user machines integrates signature-free
behavioral sensors within the container to automatically detect all forms of malware
activity: known, unknown, and zero-day. This far exceeds the limitations of signaturebased systems that require one signature for each unique exploit.
Invincea’s behavioral sensors understand the legitimate behavior of how applications
run inside the secure container, thus detecting malicious activity regardless of how
many variants of exploits try to take advantage of a vulnerability. This approach also
significantly reduces false positives commonly found in other traditional behavioral
detection technologies when trying to detect unknown and zero-day attacks.
Prevention
The prevention capabilities provided by the system greatly exceed the benefits provided
by detection-only systems. While having knowledge of breaches is important, the cost
of remediation, lost employee productivity, and the risk of having lost valuable
intellectual property or financial loss after a breach occurs is something that is not
possible to roll-back. Once the breach occurs, regardless of how fast it is detected, the
organization incurs a loss.
Invincea’s policy-based prevention rules enable an organization to stop a breach before
it occurs, and contain the forensics evidence to be used for further risk analysis,
adversarial attribution, legal proceedings, and further hardening of the security
infrastructure.
Intelligence
Rich forensics of malware activity captured during the containment, detection, and
prevention cycles on the endpoint can be investigated to provide actionable intelligence
and investigation into the current risk posture against the organization. One can easily
determine if this is simply an attack of opportunity (i.e. a watering hole or drive-by
attack) or if the organization is the target of a concerted attack effort.
Data forensics and incident responders (DFIR) have the ability to trace the attack
lifecycle, investigate the artifacts from the prevented malware attempt, and fuse this
information with other threat intelligence services and security information event
management systems, without the pressure of responding to an active breach in
progress that can spin out of control as malware pivots throughout the organization.
Invincea Platform for User-Oriented Threats
The protection capabilities of the Invincea platform delivers a comprehensive
framework for all user-oriented attack vectors:

Browser-based attacks
Page 9 of 10










o Spear-phishing7
o Watering hole attacks8
o Attacks of Opportunity9
o Poisoned Search Engine Optimizations
o Infected advertisements
PDF documents
Adobe Flash
Adobe Acrobat
Microsoft Office documents (Word, Excel, PowerPoint)
Microsoft Outlook email helper applications
Microsoft Silverlight
Apple QuickTime
Custom browser plug-ins
User channel operating system attack vectors (Windows XP, 7, 8.110)
And many more attack vectors
Organizations select the Invincea platform for a comprehensive set of user protection,
prevention, and analysis capabilities across multiple attack vectors as part of their
unified security infrastructure.
Conclusion and more information
This paper presents the business and security realities of user-targeted ransomware
threats across an organization. Legacy technologies are not adequate in addressing the
modern issues with user threats, and organizations should seriously evaluate if
repurposing point-solutions can meet their current and future needs specific to
advanced malware threats.
For more information on the Invincea platform and protecting against user-targeted
exploits and other forms of security threats, please contact:



Website: www.invincea.com
Email: [email protected]
Phone: +1-855-511-5967 or +1-703-352-7680
7
http://www.invincea.com/why-invincea/spear-phishing-protection
http://www.invincea.com/why-invincea/watering-hole-attacks
9
http://www.invincea.com/why-invincea/attacks-of-opportunity
10
Invincea FreeSpace client version 4, July 2014 release
8
Page 10 of 10