News : KnowBe4 CyberAlert: Double-Barrel Ransomware and DDos Attack in-one
#contactcenterworld, @knowbe4, @mrb_pr
Tampa Bay, FL May 24, 2016 -- KnowBe4, issued an alert on a malicious new trend in ransomware. Instead of "just" encrypting data files on a workstation (plus any network drive it can find) and locking the machine, a new variant of the Cerber ransomware is now adding a DDoS bot that can quietly blast spoofed network traffic at various IPs.
This is the first time DDoS malware has been bundled within a ransomware infection. It means that while the victim is unable to access their endpoint, that same endpoint is being used to deny service to another victim. Two attacks for the price of one (and two ways cybercriminals can make money off victims).
KnowBe4’s CEO Stu Sjouwerman noted, "Adding DDoS capabilities to ransomware is one of those "evil genius" ideas. Renting out DDoS botnets on the Dark Web is a very lucrative business, even if prices have gone down in recent years. It looks like this is the first case where a cybermafia has bundled ransomware with a DDoS bot, but you can expect it to become a fast-growing trend."
Discovered by Invincea, who said in a website post: "The observed network traffic looks to be flooding the subnet with UDP packets over port 6892. By spoofing the source address, the host could direct all response traffic from the subnet to a targeted host, causing the host to be unresponsive."
The attackers use Visual Basic to launch a file-less attack, and most antivirus and "next-gen" antivirus vendors are completely blind to file-less attack methods. Consequently, they are unable to see this until it has been dropped on the disk. At that point scanners can find it, and many do, but often that's too late.
Sjouwerman advised, "The sample Invincea analyzed is being detected by 37 out of the 57 antivirus engines on VirusTotal, but the next sample will be invisible for a few days so do not count on your endpoint anti-malware layer 100%, as that will provide a false sense of security. The attachment relies on social engineering the employee to activate the Macro feature in Office, which then executes a malicious VBScript that downloads and runs the malware."
The ransomware is executed first, which encrypts the user's data and then blocks their access to the computer by locking the screen. After this sequence, a second binary called 3311.tmp is launched into execution and starts sending a large amount of network traffic out of the infected computer.
Many people get infected with ransomware but some are able to restore from backup. By adding a DDoS bot to the ransomware payload, these cybercriminals create a two-for-one and can squeeze network traffic out of non-paying victims and use it as another criminal revenue stream.
Sponsor message - content continues below this message
Employee Engagement Awards NOW OPEN!
Enter your center,and compete for this prestigious award to attract new staff and show investors and customers you are #1 in your nation!!
Content continues ….
KnowBe4 offers up eight ways to address it, in addition to weapons-grade backup:
- "From here on out with any ransomware infection, wipe the machine and re-image from bare metal.
- If you have no Secure Email Gateway (SEG), get one that does URL filtering and make sure it's tuned correctly.
- Make sure your endpoints are patched religiously, OS and3rd Party Apps.
- Make sure your endpoints and web-gateway have next-gen, frequently updated (a few hours or shorter) security layers.
- Identify users that handle sensitive information and enforce some form of higher-trust authentication (like 2FA).
- Review your internal security Policies and Procedures, specifically related to financial transactions to prevent CEO Fraud.
- Check your firewall configuration and make sure no criminal network traffic is allowed out.
- Deploy new-school security awareness training, which includes social engineering via multiple channels, not just email. Since phishing has risen to become the #1 malware infection vector, and attacks are getting through company filters too often, getting users effective security awareness training which includes frequent simulated phishing attacks is a must. "
Today's Tip of the Day - Do Your Agents Have All The Right Tools?
More Editorial From KnowBe4
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was seriously neglected, KnowBe4 was created by Kevin Mitnick (World’s Most Famous Hacker) and Stu Sjouwerman, to help organizations manage the problem of social engineering through security awareness training. Over 1,500 organizations use KnowBe4 to keep employees on their toes. KnowBe4 is used in all industries, including finance, healthcare, energy, government and insurance.
About MRB PR:
MRB PR is a public relations company.
Published: Thursday, May 26, 2016
Concentrix, a wholly-owned subsidiary of SYNNEX Corporation (NYSE: SNX), is a business services company. We focus on customer engagement and improving business outcomes for over 450 global clients acr...
ConSol bridges the gap between governments, corporations institutions and their stakeholders using technology, facility provides efficient services in exchange of valuable information solutions that i...
Eckoh is a global provider of Secure Payment and Customer Engagement solutions via our Eckoh Experience Portal as well as Third Party Support. We’ve an international client base and offices in the UK ...
eGain customer engagement solutions power digital transformation for leading brands. Our top-rated cloud applications for social, mobile, web, and contact centers help clients deliver connected custom...