26
1 ©2016. CYREN Ltd. All Rights Reserved ©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. A DEEP DIVE ON RANSOMWARE An Update from the May 2016 Cyberthreat Report Avi Turiel

Webinar: A deep dive on ransomware

Embed Size (px)

Citation preview

Page 1: Webinar: A deep dive on ransomware

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

A DEEP DIVE ON RANSOMWARE An Update from the May 2016 Cyberthreat Report

Avi Turiel

Page 2: Webinar: A deep dive on ransomware

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

Ransomware 101

Notable Q1 ransomware

(and decryption success)

Locky in detail

Q1 Cyberthreat data

Agenda

Page 3: Webinar: A deep dive on ransomware

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

Ransomware in Q1

©2016. CYREN Ltd. All Rights Reserved

Page 4: Webinar: A deep dive on ransomware

4© 2014 CYREN Confidential and Proprietary 4©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

Page 5: Webinar: A deep dive on ransomware

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Petya: Overwrites master boot record

• Samsam: Compromises servers, uses the servers to compromise other networked machines, and then holds them ransom

• TeslaCrypt: Originally targeted game files, now targets all file types

• GhostCrypt: Masquerades as CryptoLocker

• CryptoWall: Provides a free single-use decryption

• Jigsaw: Deletes increasing numbers of files till ransom is paid (and 1,000 files after reboot)

• Locky

Ransomware in Q1

Search: Bleeping computer, Jigsaw

Page 6: Webinar: A deep dive on ransomware

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Don’t count on these though…

• Ransomware gets patched

• E.g.: TeslaCrypt V3

Some ransomware decryption success!

Page 7: Webinar: A deep dive on ransomware

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Do you know anyone who has been infected with Ransomware?

• Yes

• No

Poll: First hand experience

Page 8: Webinar: A deep dive on ransomware

8© 2014 CYREN Confidential and Proprietary 8©2016. CYREN Ltd. All Rights Reserved

Understanding Locky

Page 9: Webinar: A deep dive on ransomware

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• First extensive use of JavaScript as an email delivery method

• Most variants in a single day

• Highest email malware attachments in a single day

• Vast numbers of compromised websites

• Over 1 million tracked by CYREN

• Encrypts all files on shared network drives

Locky highlights

Page 10: Webinar: A deep dive on ransomware

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• First detected in February

• Initial distribution by MS-Word macro malware (email attachments)

• Initially from same botnet as used for Dridex (banking malware)

Brief history

Email with JSattachment

Redirect to compromised

site hosting ransomware

Download and run

Encrypt filesDemand ransom

Page 11: Webinar: A deep dive on ransomware

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

Locky delivery emails

Page 12: Webinar: A deep dive on ransomware

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Emails with malware attachments surged 412% in March due to Locky outbreaks

• Primarily during weekdays and between working hours

• Also spread via Web exploit kits

Vast distribution

Page 13: Webinar: A deep dive on ransomware

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Ubiquitous in email - most systems view it as benign

• Easy to reprogram (less skill needed), automated creation of variants

• Many obfuscation tools

• Small size

• Locky is the first malware to use JavaScript (JS) in such massive quantities

• Over 1.5 million variants in one day (30 March)

Locky uses JavaScript

Page 14: Webinar: A deep dive on ransomware

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Malware deletes itself if Russian language detected

• Encrypts:• Videos, images, documents, and source code

• Files located in connected networks, servers, or drives (including removable)

• Renames to .locky

• Deletes any local back-up files

• If bitcoin wallet is found it is emptied, then scrambled

Post-infection

Ransomware does not have to hide

Page 15: Webinar: A deep dive on ransomware

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

Page 16: Webinar: A deep dive on ransomware

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• 0.5 to 1 bitcoin for individual computers

• ~$200 - $400

• 50 or more bitcoins for business

• ~$20,000

• Multiple onion links, multiple bitcoin addresses

Paying the ransom

Page 17: Webinar: A deep dive on ransomware

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

• Do you know the outcome of the Ransomware experience/s you have dealt with/are familiar with?

(choose multiple answers):

• Paid and got files back

• Paid but files were not decrypted

• Didn’t pay but managed to recover data (e.g.: backup)

• Didn’t pay and lost data

• Unsure of outcome/No experience with Ransomware

Poll: Dealing with ransomware

Page 18: Webinar: A deep dive on ransomware

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

IMPROVE YOUR PREVENTION

• Email security gateway

• 91% of attacks start in email

• Stop spam, viruses before they reach your users

• Web security gateway

• Stop malware downloads, malicious URLs

• Stop C&C communications, data exfiltration

• Network sandboxing

• Identify and stop never-before-seen malware

• Endpoint security with active monitoring

• Make sure its up to date

• Security training

• Social engineering, don’t click that link…

How to avoid being a ransomware victim

IMPROVE YOUR DETECTION/RESPONSE

• Backup and recovery

• Implement it

• Test it

• Know the difference between backup and sync

• Network shares

• Avoid mapping network drives with large file repositories (or no write permissions)

Page 19: Webinar: A deep dive on ransomware

20© 2014 CYREN Confidential and Proprietary 20©2016. CYREN Ltd. All Rights Reserved

Page 20: Webinar: A deep dive on ransomware

21© 2014 CYREN Confidential and Proprietary 21©2016. CYREN Ltd. All Rights Reserved

Page 21: Webinar: A deep dive on ransomware

22© 2014 CYREN Confidential and Proprietary 22©2016. CYREN Ltd. All Rights Reserved

Page 22: Webinar: A deep dive on ransomware

23© 2014 CYREN Confidential and Proprietary 23©2016. CYREN Ltd. All Rights Reserved

Page 23: Webinar: A deep dive on ransomware

24© 2014 CYREN Confidential and Proprietary 24©2016. CYREN Ltd. All Rights Reserved

Page 24: Webinar: A deep dive on ransomware

25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

CYREN Powers the World’s Security

500K+ Threat collection points

600M+Users protected

17B+Daily transactions

130M+Threats blocked

Page 25: Webinar: A deep dive on ransomware

26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved©2016. CYREN Ltd. All Rights Reserved

CYREN’s 100% cloud security services

SaaS Secure Web Gateway protects users from cyber-

threats, monitors and controls web usage, and protect users both on and off the network.

SaaS Secure Email Gateway protects users from spam,

phishing attacks, viruses and zero-hour malware with a

seamless end-user experience.

Cloud-powered threat intelligence and SDKs allow

technology vendors and service providers to detect a broad set

of cyber-threats, including malicious websites, phishing

attacks, malware, botnets, and spam.

Enterprise OEM

Page 26: Webinar: A deep dive on ransomware

27©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2016. CYREN Ltd. All Rights Reserved

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2016. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Thank You. Any Questions or Thoughts?