40
1 Joanna Wziątek-Ładosz Sales Engineer, Sophos Ransomware: is there any way you can protect yourself?

1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

1

JoannaWziątek-ŁadoszSalesEngineer,Sophos

Ransomware:isthereanywayyoucanprotectyourself?

Page 2: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

2

Whatwe’regoingtocover

• Ransomwareorigins• Anatomyofaransomwareattack• Thelatestransomware – introducingLocky anditsfriends• Whytheseattacksaresosuccessful• Practicalstepstoprotectyourorganizationfromransomwarethreats• HowSophoscanhelp

Page 3: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

3

HistoryofRansomware

• Thefirstknownransomwarewasfoundin1989

• AIDSTrojan/PCBorgmalware.

• Aninfectedcomputerwoulddisplayamessagetotheuserthatoneoftheirprogramshadexpiredandtheyneededtopay$189tohaveitrestored.

• Thecreatorwaseventuallycaughtandtheransomwaregenrewentundergroundforseveralyears,thoughitreappearedbrieflyin2005and2006.

Page 4: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

4

Page 5: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

5

Page 6: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

6

Page 7: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

7

Page 8: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

8

Cryptolocker

• WiththeriseofCryptoLocker in2013,acriminalgangfirstdemonstratedtheabilitytoreliablycombineremoteencryptionwithremoteextortiononamassscale.

• CryptoLocker wastakendownbylawenforcementauthoritiesinMay2014,andforthenextseveralmonths,therewasasignificantreductionintheprevalenceofransomware.

• Itnotonlyshowedhowencryptingransomwarecouldbemadetowork:italsoshowedjusthowlucrativethismalwarebusinesscouldbe.

• AccordingtoUSDepartmentofJusticefilings,CryptoLocker earned$27,000,000foritsownersinjusttwomonths.

Page 9: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

9

Page 10: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

10

Page 11: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

11

Growth

Howmanypercenthas ransomwareincreasedbetween2014and2015?

Answer:About170%Thereasonfortheriseissimple–ransomwareworks.

Datasofarshowsthatthisfigurefor2016willatleastdouble.

Page 12: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

12

Facts about encyption• Cryptolockernormally uses AES256-bitencryption.But inlaterversionsthey havechanged this toAES128-bitencryption.

Filetypesthatusuallyareencrypted:

*.3fr,*.accdb,*.ai,*.arw,*.bay,*.cdr,*.cer,*.cr2,*.crt,*.crw,*.h,*.dbf,*.dcr,*.der,*.dng,*.doc,*.docm,*.docx,*.dwg,*.dxf,*.dxg,*.eps,*.erf,*.indd,*.jpe,*.jpg,*.kdc,*.mdb,*.mdf,*.mef,*.mrw,*.nef,*.nrw,*.odb,*.odm,*.odp,*.ods,*.odt,*.orf,*.p12,*.p7b,*.p7c,*.pdd,*.pef,*.pem,*.pfx,*.ppt,*.pptm,*.pptx,*.psd,*.pst,*.ptx,*.r3d,*.raf,*.raw,*.rtf,*.rw2,*.rwl,*.srf,*.srw,*.wb2,*.wpd,*.wps,*.xlk,*.xls,*.xlsb,*.xlsm,*.xlsx

Page 13: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

13

2mainvectorsofattack

• SPAM (viasocialengineering)○ Seeminglyplausiblesender○ Hasattachmente.g.invoice,parceldeliverynote○ Theattachmentcontainsanembeddedmacro○ Whentheattachmentisopenedthemacrodownloads

andthenexecutestheransomwarepayload○ UsedbyLocky,TorrentLocker,CTB-Locker

• Exploitkits○ Blackmarkettoolsusedtoeasilycreateattacksthat

exploitknownorunknownvulnerabilities(zero-day)○ ClientsidevulnerabilitiesusuallytargettheWebbrowser○ UsedbyAngler,CryptoWall,TeslaCrypt,CrypVault,

ThreatFinder

Page 14: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

1414

Anatomyofaransomwareattack

Page 15: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

15

Anatomyofaransomwareattack

Andgone

Theransomwarewillthendeleteitselfleavingjusttheencryptedfilesandransomnotesbehind.

Ransomdemand

Amessage appearsontheuser’sdesktop,explaininghowaransom(oftenintheformofbitcoins)canbepaidwithinatimeframeofe.g.72hourstoenabledecryptionofthedatawiththeprivatekeythatonlytheattacker’ssystemhasaccessto.

Encryptionofassets

Certainfilesarethenencryptedonthelocalcomputerandonallaccessiblenetworkdriveswiththispublickey.AutomaticbackupsoftheWindowsOS(shadowcopies)areoftendeletedtopreventdatarecovery.

Contactwiththecommand&controlserveroftheattacker

TheransomwaresendsinformationabouttheinfectedcomputertotheC&Cserveranddownloadsanindividualpublickeyforthiscomputer.

Installationviaanexploitkitorspamwithaninfectedattachment

Onceinstalledtheransomwaremodifiestheregistrykeys

Page 16: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

16

Ransomdemands

Page 17: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

17

Payingransoms

• PaymentismadeinBitcoins• InstructionsareavailableviaTor• Theransomincreasesthelongeryoutaketopay

• Onpaymentoftheransom,thepublicencryptionkeyisprovidedsoyoucandecryptyourcomputerfiles

Page 18: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

1818

Commonransomware:Locky andfriends

Page 19: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

19

Locky:thenewkidontheblock

• Nicknameofanewstrainofransomware,so-calledbecauseitrenamesallyourimportantfilessothattheyhavetheextension .locky

• RansomsvaryfromBTC 0.5toBTC 1.00(1BTCisworthabout$400/£280).• Startedhittingtheheadlinesinearly2016• Wreakinghavocwithatleast400,000machinesaffectedworldwide

Page 20: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

20

AcommonLocky attack

• Youreceiveanemailcontaininganattacheddocument.○ Thedocumentlookslikegobbledegook.○ Thedocumentadvisesyoutoenablemacros“ifthedataencodingisincorrect.”

○ Thecriminalswantyoutoclickonthe'Options'buttonatthetopofthepage.

• OnceyouclickOptions,Lockywillstarttoexecuteonyourcomputer.

• Assoonasitisreadytoaskyoufortheransom,itchangesyourdesktopwallpaper.

• Theformatofthedemandvaries,buttheresultsarethesame.

Page 21: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

21

CTB-Locker

• Peculiarity:Businessmodelbasedonaffiliations○ Infectionsareconductedby'partners'whoreceiveinreturnaportionofthetakings○ Enablesfasterspreadingofmaliciouscode○ ApproachnotablyusedinthepastbyFake-AV

• Thecybercrooksoffer theoptionofamonthlypayment• HasalsobeenwidelydistributedbytheRigandNuclearexploitkits• AswithTorrentLocker, themajorityofinfectionshavestartedviaspamcampaigns

Page 22: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

22

CTB-Lockervariantthatattackswebsites

• SamenameastheransomwarethatattacksWindowscomputers• WritteninPHP• FirstattackintheUKon12thFebruary2016• Alreadymanyhundredsofsiteshavebeenattacked• Attackswebsitesbyencryptingallfilesintheirrepositories• Apassword-protected‘shell’isinstalledonmostoftheaffectedsites,allowingattackerstoconnecttotheserver(s) viaabackdoor

Page 23: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

23

Angler:anall-too-well-knownexploitkit

• Growninnotorietysincemid2014○ Thepayloadisstoredinmemoryand

thediskfileisdeleted○ Detectssecurityproductsandvirtual

machines○ Abilitytospreadmanyinfections:

bankingTrojans,backdoor,rootkits,ransomware

• Easytouse○ Doesn’trequireanyparticulartechnical

competence○ AvailableforafewthousandUSDonthe

DarkWeb

Page 24: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

24

Angler’sevolutionintothedominantexploitkit

Sep2014 Jan2015 May 2015

Page 25: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

25

ChainofinfectionforAnglerexploitkits1. Thevictimaccesses acompromisedwebserver

throughavulnerablebrowser2. Thecompromisedwebserverredirectsthe

connectiontoanintermediaryserver3. Inturn,theintermediaryserverredirectsthe

connectiontotheattacker’sserverwhichhoststhedestinationpageoftheexploitkit

4. Thedestinationpagelooksforvulnerableplug-ins(Java,Flash,Silverlight)andtheirversionnumbers

5. Ifavulnerablebrowserorpluginisdetectedtheexploitkitreleases itspayloadandinfectsthesystem.

Page 26: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

26

Page 27: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

2727

Whytheseattacksaresosuccessful

Page 28: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

28

Whyaretheseattackssosuccessful?Professionalattacktechnology• Highlyprofessionalapproache.g.usuallyprovidestheactualdecryptionkeyafterpaymentoftheransom

• Skillfulsocialengineering• Hidemaliciouscodeintechnologiesthatarepermittedinmanycompaniese.g.MicrosoftOfficemacros,JavaScript,VBScript,Flash…

Page 29: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

29

Whyaretheseattackssosuccessful?Securityweaknessesintheaffectedcompanies• Inadequatebackupstrategy• Updatesandpatchesarenotimplementedswiftlyenough• Dangeroususer/rightspermissions– morethantheyneed• Lackofusersecuritytraining• Securitysystemsarenotimplementedorusedcorrectly• LackofITsecurityknowledge• Conflictingpriorities:securityvsproductivityconcerns

Page 30: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

3030

Practicalstepstoprotectagainstransomware

Page 31: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

31

Bestpractices– dothisNOW!

1. Backupregularlyandkeeparecentbackupcopyoff-site.2. Don’tenablemacrosindocumentattachmentsreceivedviaemail.3. Becautiousaboutunsolicitedattachments.4. Don’tgiveyourselfmoreloginpowerthanyouneed.5. ConsiderinstallingtheMicrosoftOfficeviewers.6. Patchearly,patchoften.7. Configureyoursecurityproductscorrectly.

Page 32: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

32

Securitysolutionrequirements

Asaminimumyoushould:• Deployantivirusprotection• Blockspam• Useasandboxingsolution• Blockriskyfileextensions(javascript,vbscript,chmetc…)• Passwordprotectarchivefiles• UseURLfiltering(blockaccesstoC&Cservers)• UseHTTPSfiltering• UseHIPS(hostintrusionpreventionservice)• Activateyourclientfirewalls• Useawhitelistingsolution

Page 33: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

33

Additionalsteps

• Employeeawareness&training○ SophosITSecurityDosandDon’ts○ SophosThreatsaurus

• Segmentthecompanynetwork○ NACsolutionsensureonlyknowncomputerscanaccessthenetwork○ Separatefunctionalareaswithinafirewalle.g.clientandservernetworks

• Encryptcompanydata○ Itdoesn’tstoptheransomwarebutpreventsdamagecausedbysensitivedocumentsgettingintothewronghands

• Usesecurityanalysistools○ Ifaninfectiondoesoccur,it’svitalthatthesourceisidentifiedandcontainedASAP.

Page 34: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

3434

HowSophoscanhelp

Page 35: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

35

Complete protection:EnduserandNetwork

SophosCentral

EnduserNetwork

Next-GenFirewall/UTM

WebSecurity

EmailSecurity

WirelessSecurity

SafeGuardEncryption

MobileControl

Next-GenEndpointProtection

ServerSecurity

SecuretheEndpoint(PC/Mac)

NextGenEndpoint securitytoprevent,detect,investigateand

remediate

SecuretheMobileDeviceSecuresmartphonesandtabletsjustlikeanyotherendpoint

SecuretheServersProtectionoptimizedforserverenvironment(physicalorvirtual):

fast,effective,controlled

ProtecttheDataSimple-to-useencryptionforahighlyeffectivelastlineofdefenseagainstdataloss

SecurethePerimeterUltimateenterprisefirewallperformance,security,and

control.

SecuretheWebAdvancedprotection,control,andinsightsthat’seffective,

affordable,andeasy.

SecuretheEmailEmailthreatsandphishingattacks

don’t standachance.

SecuretheWirelessSimple,secureWi-Fi

connection.

Page 36: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

36

SecurityasaSystem

SynchronizedSecurityIntegrated,context-awaresecuritywhereEnduser andNetworktechnology sharemeaningful informationtodeliverbetterprotection

SecuritymustbecomprehensiveThecapabilities requiredtofully satisfy customerneed

SecuritycanbemadesimplePlatform,deployment,licensing, userexperience

SecurityismoreeffectiveasasystemNewpossibilities throughtechnologycooperation

NextGenEnduserSecurity

NextGenNetworkSecurity

SophosCloud

heartbeat

SOPHOSLABS

Page 37: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

37

MaliciousTrafficDetection

SOPHOSSYSTEMPROTECTOR

ApplicationTracking

ThreatEngine

ApplicationControl

Emulator DeviceControl

WebProtection

IoCCollector

LiveProtection

SecurityHeartbeat

HIPS/RuntimeProtection

Reputation

MaliciousTraffic

Detection

Soph

osL

abs

URLdatabase

MalwareIdentities HIPSrulesGenotypesFilelook-up Reputation Apps SPAM

DataControl

PeripheralTypes

Anon.proxies

Patches/VulnerabilitiesWhitelist

Administratoralerted

Application interrupted

i Compromise

User|System|File

MTDrules

Malicious trafficdetected

MaliciousTraffic

Detection

Page 38: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

38

SophosSandstorm

HowSophosSandstormworks

1. Ifthefilehasknownmalwareit’sblockedimmediately.Ifit’sotherwisesuspicious,andhasn’tbeenseenbefore,itwillbesenttothesandboxforfurtheranalysis.Whenwebbrowsing,usersseeapatiencemessagewhiletheywait.

2. Thefileisdetonatedinthesafeconfinesofthesandboxandmonitoredformaliciousbehaviour.Adecisiontoalloworblockthefilewillbesenttothesecuritysolutiononcetheanalysisiscomplete.

3. Adetailedreportisprovidedforeachfileanalyzed.

AdvancedThreatDefense MadeSimple

SecureWebGateway

SecureEmailGateway

UnifiedThreatManagement

Next-GenFirewall

Page 39: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

3939

Questions?

Page 40: 1 - Sophos Ransomware Budapest Apr2016 - TMSI · ○ Used by Locky, TorrentLocker , CTB-Locker • Exploit kits ○ Black market tools used to easily create attacks that exploit known

40© Sophos Ltd. All rights reserved.