Ready to Start Your Career?

By: gurubaran
December 29, 2016
No More "Ransom" Gives Global Power Against the Ransomware Battle

By: gurubaran
December 29, 2016

Types of Ransomware
There are two main forms of ransomware in Circulation today- Locker Ransomware
- Crypto Ransomware
Locker Ransomware
Locker ransomware is typically spread through social engineering, phishing campaigns, and Vulnerable sites. Locker ransomware simply restricts user access to infected systems by either denying access to the user interface or by restricting the availability of computing resources.Certain capabilities, such as numeric keyboard functionality, might remain unlocked while the rest of the keys and the mouse are locked. This design increases user frustration while restricting user action to following the attacker’s instructions.This type of ransomware is akin to the locked door in the earlier analogy. Locker ransomware usually leaves underlying files and systems unaffected; instead, it only restricts access to the interface. This design also means that locker ransomware can often be removed easily by restoring the system to a restore point or by deploying a commercial removal toolAttackers abandoned locker ransomware in favor of its more robust counterpart, crypto ransomware. Locker variants are still developed, but they are less numerous than crypto ransomware families.

Crypto Ransomware
Instead of restricting user action by denying access to the user interface, Crypto ransomware targets the data and filesystems on the device. The critical system files and functionality tend to remain unaffected.The victim can use the computer to do anything except access the encrypted files. Crypto ransomware often includes a time limit, after which the decryption key may or may not actually be permanently deleted if the victim does not pay the ransom on time.People do not think rationally under time limits; as before, the cyber-criminals are compensating for a lack of technical sophistication by leveraging human behavior against the victim.The victim is subject to the anxiety of the ticking clock, the fear of the consequences of making the wrong decision, and the fear of regret if the data is lost forever.Crypto ransomware did not popularize until 2013 because attackers failed to realize that successful crypto ransomware attacks rely on current strong encryption algorithms and proper management of the accompanying cryptographic key.According to information security researchers at Symantec, the current crypto ransomware threat landscape is still fragmented into new entrants into the market and mature criminal groups. Both types of attackers try to employ industry-standard encryption algorithms, such as RSA, Triple Data Encryption Standard (3DES), and Advanced Encryption Standard (AES) with a suitably large key in their ransomware.

Examples of Crypto ransomware
Locky:On February 5, 2016, medical systems belonging to Hollywood Presbyterian Medical Center were infected with the Locky ransomware. Healthcare data remained unaffected but, computers essential to laboratory work, CT scans, emergency room systems, and pharmacy operations were infected.And the hospital paid a ransom of 40 Bitcoins ($17,000) to unlock their machines.Seems the Hospital was not targeted, but occurs in as a result of a random malicious email.TeslaCrypt/ EccKrypt:TeslaCrypt infects systems through the Angler exploit kit, which leverages vulnerabilities in Adobe Flash (such as CVE-2015-0311). Silverlight and Internet Explorer may be exploited in absence of Adobe Flash.The TeslaCrypt binary is compiled in Visual C++. The ransomware code is encoded within the binary. After the code is decrypted into memory, TeslaCrypt overwrites the MZ binary 13 onto itself.Initially, TeslaCrypt used symmetric encryption; however, after researchers from Cisco’s Talos Group released a decryption tool (the Talos TeslaCrypt Decryption tool), the authors reconfigured TeslaCrypt to use asymmetric AES encryption. By late 2015, Kaspersky labs had released another decryption tool, the TeslaCrypt Decryptor.TeslaCrypt originally targeted 185 file types related to 40 computer games (Call of Duty, Skyrim, Minecraft, etc.) on Windows systems.Victims are prompted to pay a ransom of ~$500 (in Bitcoins, PaySafeCard, or Ukash).

Cryptolocker installs in the user profile folder and adds a key to the system registry so that it runs at startup. Next, it connects to one of its C2 servers and generates a 2048-bit RSA key pair, stores the private key on the server, and sends the public key back to the victim machine.This trojan encrypts documents, pictures, and CAD files on the local hard drives and mapped network drives with the public key and logs each encrypted file as a registry key.Cryptowall/ CryptoDefense/CryptorBit:The Cryptowall family of ransomware first appeared in early 2014 and became popular after Operation Torvar dismantled the Cryptolocker network.Cryptolocker is spread through various exploit kits, spam emails (with attached RAR files that contain CHM files), and malvertising pages.
Current variants of the malware (such as Cryptowall 3.0) use I2P network proxies to communicate with their C2 infrastructure and they use the Tor network to collect Bitcoin payments from victims. Initial variants encrypted victim files with RSA public-key encryption; however, the malware has now (Cryptowall 3.0) evolved to use the AES 256 algorithm.Unlike Cryptolocker, the Cryptowall malware targets Windows systems globally; though, the United States (13%), Great Britain (7%), the Netherlands (7%), and Germany (6%) were the most affected.CTB-Locker:The “Curve-Tor-Bitcoin-Locker” (CTB-Locker) is a PHP based trojan that was publicly analyzed by security researcher Kafeine in mid-2014. CTB Locker is essentially a ransomware as a service (RaaS), where the attackers outsource the spread of the malware to a number of script kiddies and botnet operators (often referred to as affiliates) for a share of the paid ransoms.CTB-Locker is also available in English, French, German, Spanish, Latvian, Dutch, and Italian to accommodate affiliates and targets from most American and European countries.
CTB-Locker uses a combination of symmetric and asymmetric encryption to restrict victims’ access to their files. Rather than use RSA, which is based on prime number factorization, like most ransomware, files targeted by CTB-Locker are encrypted with AES and with Elliptic Curve Cryptography (ECC).In February 2016, attackers began to use the CTB-Locker to encrypt websites hosted by WordPress. This variant of CTB-Locker is referred to as Critroni.The attackers hack an insecure website and replace its index.php file or index.html file with different files that encrypt the site’s data with AES-256 encryption.Hybrid Ransomware:One of the prevalent malware mitigation strategies is a layered depth. It stands to reason that in accordance with the concept of mutual escalation, attackers will begin to “attack in layers.”This behavior already occurs in APT campaigns and in some ransomware attacks, where for instance, the adversary launches a DDoS attack alongside a more concerning attack.
Delivery Channels
Ransomware follows the same distribution and infection vectors as traditional malware. The primary difference is that ransomware threat actors often lack the sophistication to breach modern networks.Traffic distribution system (TDS):Traffic distribution services redirect web traffic to a site hosting an exploit kit. Often, traffic is pulled from sites hosting adult content, video streaming services, or media piracy sites.Some ransomware groups, especially criminals who purchase their malware instead of developing it themselves, may hire a TDS to spread their ransomware.If the host is vulnerable to 17 the exploit kit on the landing page, then the malware is downloaded onto the system as a driveby download.Malvertisement: As with a TDS, a malicious advertisement can redirect users from an innocuous site to a malicious landing page. Malvertisements may appear legitimate and can even appear on trusted sites if the administrator is fooled into accepting the ad provider or if the site is compromised.
Targets for Ransomware
Unlike APT campaigns, financially motivated cyber threats, like ransomware campaigns, do not care about the individual target.Instead, they target the subset of society believed to be most likely to pay the ransom demand.Ransomware is often spread in mass in the hopes that a portion of the users will pay. Ransomware, whether purchased or developed, is relatively cheap in comparison to APT malware. Delivery is virtually free.Payment Medium
The payment method has evolved with ransomware since the AIDS trojan in 1989.Instead, some variants, such as the 2009 Trojan.Ransomlock, ask for wire transfers and premium rate text messages while others demand that the ransom should be paid with a digital voucher (CashU, MoneXy, MoneyPak, etc.) or in cryptocurrencies.What to Do after a Ransomware Infection
- The first place you need to go is nomoreransom.org (No more ransom adds immense power to globe) a site hosted by lead by security firms and cybersecurity organizations in 22 countries.
- Next place to go is the Free Ransomware Decryption Tools provided by AVG.

- Another destination which is useful for victims is Ransomware Help and Tech Support section in bleeping computers.