most ransomware may not be as complex as you may think€¦ · • encourage employees to forward...

Post on 28-Jun-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

MOST RANSOMWARE MAY NOT BE AS COMPLEX AS YOU MAY THINK

HealthcareSecurityForum.com/Boston/2017 #HITsecurity

SEPTEMBER 11–13, 2017 BOSTON, MA

My Background Professor at Northeastern University, Boston •  Started malware research in about 2004 •  Helped build and release popular malware analysis and detection systems

(Anubis, EXPOSURE, Wepawet, …)

Co-founder of Lastline and Lastline Labs •  Lastline offers protection against zero-day threats and advanced malware •  Commercialization of many years of advanced research •  Lastline Labs is the research and development arm of Lastline

Key Takeaways The majority of ransomware launches relatively straight-forward attack payloads •  Using bad cryptography, or standard cryptography

libraries •  Deleting files, but not wiping them off disk Compared to other malware, ransomware has very distinct, predictable behavior •  Ransom notes with background behavior, change in

entropy of files, iterating over large numbers of files, etc.

What We Will Discuss •  Significance of the ransomware threat •  Complexity and sophistication of attacks •  Attack mechanisms •  Main ransomware weaknesses •  Better mitigation

The Anatomy of an Attack A victim machine is compromised •  Ransomware is installed •  Once the attack payload is executed (if there is one), ransomware informs

victim of the attack •  The victim needs to pay -- otherwise, his/her data is kept hostage or destroyed

Ransomware Landscape

Ransomware Evolution The ransomware concept dates back to 1989 Clearly, ransomware attacks have increased in numbers over the last 5 years •  Many security reports talk about the sophistication and complexity of

individual attacks •  The general public is left with the impression that we are faced with a

new threat that is very difficult or impossible to prevent

– FBI Security Bulletin, June 2015

“Between April 2014 and June 2015, the IC3 received 992 CryptoWall-related complaints, with victims reporting losses totaling over $18 million.”

Complexity and Sophistication Typical way of measuring ransomware sophistication •  Looking at evasion (e.g., packing, dynamic checks, encryption, etc.)

•  In this work, we are looking at the sophistication of the attack after compromise

BETTER MITIGATION

Better Mitigation

Achilles’ Heel of Ransomware Ransomware has to inform victim that attack has taken place •  Behavior inherent in its nature

Ransomware has certain behaviors that are predictable •  e.g., entropy changes, modal dialogs and

background activity, accessing “honey” files

Example: Dissecting Cryptolocker Analysis Overview

Example: Dissecting Cryptolocker

Loaded libraries…

Apocalypse

Chimera

Almalocker

Behavior Summary

Which common ransomware behaviors did you observe?

Detectable Behaviors

Some Ransomware Families almalocker apocalypse Bart blackshades / troldesh blocker bucbi cerber chimera coverton cribit critroni crowti cryakl cryfile crypfort crypmod crypmodadv

crypren cryproto crypt cryptear cryptodef

cryptolocker cryptowall cryptxxx cryrar crysis cryzip dalexis/CTBLocker/crypctb deshacop

dircrypt diskcoder dmalocker

domino doubleeagle ducry empercrypt exxroute

fantomcrypt filecoder filecryptor filelocker Geograph goopic gpcode gulcrypt

hexzone hmblocker hydracrypt

jigsaw jigsawlocker jobcrypter keeplock kryptik

lockscreen locky loktrom lortok lvbp maktub manamecrypt mbrlock

memekap nanolocker nymaim

ophionlock orxlocker padcrypt Petya/Mikhail/Mischa pinkblocker

pornoasset pottieq qikencrypt

rackcrypt radamcrypt rakhni rokku rsarist ruqwili ryzerlo samas

sarento teerac tescrypt threatfin torrentlocker

tovicrypt toxkrypt vbcrypt venuslocker virlock winlock winplock wlock

xorist yakes zepto zerolocker

Common Infection Vectors Email attachments / URL’s •  ZIP, DOC, JS, JSE, JScript, VBS, VBE, JAR, BAT, PS1, HTA •  Usually with a Social Engineering component Web •  Exploit Kits •  Some social engineering Server •  RDP brute force •  OWA brute force

Defenses Email •  Block attachment types which are high risk and limited business value •  Restrict use of web mail on employer hardware (policy) •  Encourage employees to forward suspicious mail to InfoSec / IT team Web •  Restrict risky browser plugins •  Train employees to use an “inside / “outside” browser model

—  IE/Edge with business necessary high risk plug-ins for inside —  Firefox with adblockplus or ublock origin for outside

Server •  Multifactor authentication to slow down EVERYONE! J

Key Takeaways The majority of ransomware launches relatively straight-forward attack payloads •  Using bad cryptography, or standard cryptography

libraries •  Deleting files, but not wiping them off disk Compared to other malware, ransomware has very distinct, predictable behavior •  Ransom notes with background behavior, change in

entropy of files, iterating over large numbers of files, etc.

Engin Kirda Northeastern University / Lastline, Inc.

ek@ccs.neu.edu

HealthcareSecurityForum.com/Boston/2017 #HITsecurity

top related