January 19

Webinar takeaway – Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse

0  comments

My key takeaways

  • PC Cyborg AIDS trojan in 1998 => first known ransomware
    • $189 asked as ransom
  • CryptoLocker, 2013
    • first to ask for Bitcoin
  • "Ransomware 2.0", from 2019
    • made backups less of a protection
    • the access to the victim becomes the "gold"
  • Todays ransomware workflow
    1. stager
    2. look around (trickbot) and calling home (C2 server)
    3. if detected by virustotal, tells the ransomware to reencrypt itself! <- almost undetectable by AV/EDR software
    4. Collect passwords
    5. Notify C2 about new intrusion
    6. dwells up to 8-12 month
    7. Hacker come in, assess and analyze the victim
    8. Steal valuable data
    9. Encrypt and ask for ransom
  • LOL (living of the land) so mimic normal admin tools and traffic <- makes it even harder to detect as anomalie
  • double extortion (encryption and threat to publish stolen data) is the new norm now
  • Ransomware gangs now also have PR departments puting out press releases
  • There are approx 100-200 active ransomware groups
    • RaaS (Ransomware as a Service) makes it easy for criminals to join in
  • Ransomware gangs are also used by nation states as cyber weapons
  • New trend: Ransomware gangs are becoming access brokers
  • New trend: putting cryptominers in the victims network for some extra bling
  • New trend: DDoS, instead of encryption <- make backups worthless again
  • New trend: more and more LOL and changing tactics "on-the-fly"
  • Might we end up in a good bot vs bad bot world regarding ransomware?
  • Ransomware is not the real problem, it's how ransomware got in and become admin! <- stop the root cause
  • 50% of all ransomware attacks might be rooted to social engineering
    • top 3 causes:
      1. social engineering
      2. unpatched software
      3. password issues
  • Ransomware is also spread by Google Ads

Env

additional links


Tags

ransomware, social engineering


You may also like

Event takeaway: Layer8 Conference

My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special prononciation of certain words identifying the persons origin List of words of identifiers per language The great casino heist: key takeaways from my first big social engineering engagement "get out of jail"-cards must be signed to work career

Read More

Event takeaway: Deutscher IT-Security Kongress

My key takeaways hardening backup systems is key disconnected from the AD designed in a way, that it may continue functioning even if all other systems are shut down due to testing and verification of software patches in most B2B environments before rollout, the time a system remains unpatched is prolonged more time for the

Read More