{"id":2382,"date":"2014-08-14T14:55:43","date_gmt":"2014-08-14T14:55:43","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2382"},"modified":"2020-02-26T10:54:38","modified_gmt":"2020-02-26T15:54:38","slug":"a-few-thoughts-on-tor-augmented-malware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/a-few-thoughts-on-tor-augmented-malware\/2382\/","title":{"rendered":"A few thoughts on Tor-augmented malware"},"content":{"rendered":"<p>Back in July, Kaspersky Lab reported on a new strain of Ransomware which used anonymous network Tor (\u201cThe Onion Router\u201d) to hide its malicious nature and make it hard to track the actors behind this ongoing malware campaign.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>This is actually not the first time our researchers observed malware that uses Tor \u2013 and it certainly won\u2019t be the last.<\/p>\n<p>Until recently, it wasn\u2019t too widespread: Only a few banking malware families such as 64-bit ZeuS Trojans used Tor connections.<\/p>\n<p>For what? Does using Tor make the malware more dangerous than it is right now? <\/p><blockquote class=\"twitter-pullquote\"><p>A few thoughts on #Tor-enabled #malware. #Kaspersky #protectmybiz #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6JDe&amp;text=A+few+thoughts+on+%23Tor-enabled+%23malware.+%23Kaspersky+%23protectmybiz+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Well, the answer is somewhat ambiguous. Both 64-bit ZeuS Trojans and the new ransomware, which Kaspersky Lab called \u201cOnion\u201d, by the way, use Tor to conceal the C&amp;C-servers in order to complicate the search for the malware operators. In a nutshell, this works. Tor\u2019s architecture makes it next to impossible to de-anonymize its users, even if illegitimate tools are used. And while it was devised to battle censorship, cybercriminals unsurprisingly employ it.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020100\/wide-21-1.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-2384\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020100\/wide-21-1.png\" alt=\"wide-2\" width=\"1000\" height=\"668\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>At the same time Onion doesn\u2019t become more dangerous just because its C&amp;C infrastructure is now hidden well. It is a problem for IT security experts, not for the businesses that are the primary target for the malware itself.<\/p>\n<p>Even without any Tor beef-ups, Onion is dangerous as hell. A direct \u201cheir\u201d to dreaded CryptoLocker, CryptoDefence\/CryptoWall, ACCDFISA and GpCode, it is yet another ransomware that encrypts all the files it can reach, then demands a ransom.<\/p>\n<p>The cybercriminals claim there is a strict 72-hour deadline to pay up, or all the files will be lost forever, which is likely true: Onion uses the asymmetric cryptographic protocol known as ECDH \u2013 Elliptic curve Diffie\u2013Hellman (to read technical details please follow <a href=\"https:\/\/securelist.com\/analysis\/publications\/64608\/a-new-generation-of-ransomware\/\" target=\"_blank\" rel=\"noopener\">this link to Securelist<\/a>).<\/p>\n<p>In short, the encrypted file cannot be decrypted without the master-private key owned by the criminals. And if it is stored just for 72 hours, as the attackers claim, there is absolutely no way to recover the encrypted files.<\/p>\n<p>Creators of Onion take no chances in their game. There\u2019s next to no way to trace the C&amp;C servers, no way to decrypt the files without the master-private key. Furthermore, the propagation method is also very unorthodox. Kaspersky Lab\u2019s researchers established that the bot Andromeda (detected as Backdoor.Win32.Androm by Kaspersky Lab products) receives a command to download and run another malicious program from the Email-Worm.Win32.Joleee family to the victim computer. The latter is primarily a malicious tool for sending spam emails, but it can also execute a number of commands from the cybercriminals, including the command to download and launch an executable file. So it is actually Joleee that downloads the encryptor to the infected computer and launches it.<\/p>\n<p>Why so complex? \u2013 It\u2019s a matter for speculation. <\/p><blockquote class=\"twitter-pullquote\"><p>Onion ransomware is a threat even w\/o Tor \u201cbeef-ups\u201d. #ransomware<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6JDe&amp;text=Onion+ransomware+is+a+threat+even+w%2Fo+Tor+%26%238220%3Bbeef-ups%26%238221%3B.+%23ransomware\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>What is certain is that this threat must be dealt with at a local level. If the critical data is backed up and stored in safety, an encryptor is a mere nuisance that may cost a business just a few hours at worst.<\/p>\n<p>But backup should be performed regularly and, moreover, copies need to be created on a storage device that is accessible only during this process (e.g., a removable storage device that disconnects immediately after backup). Failure to follow these recommendations will result in the backed-up files being attacked and encrypted by the ransomware in the same way as the original file versions.<\/p>\n<p>The security solution used should be turned on at all times and all its components should be active. The solution\u2019s databases should also be up to date.<\/p>\n<p>Kaspersky Lab products detect Onion based on its signature with the verdict Trojan-Ransom.Win32.Onion. All possible unknown modifications are detected heuristically with the verdict HEUR:Trojan.Win32.Generic, or proactively with the verdict PDM:Trojan.Win32.Generic.<\/p>\n<p>In addition, Kaspersky Lab solution incorporates the\u00a0<a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_Whitepaper_Cryptoprotection_final_ENG.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Cryptomalware Countermeasures technology<\/a>\u00a0which is capable of protecting user data even from yet-unknown encryptors for which there are still no signatures or cloud-based data available. This technology is based on the principle of creating protected backup copies of personal files as soon as a suspicious program attempts to access them.<\/p>\n<p>The technology will automatically restore the file even if it is encrypted by malware. For this technology to operate, the System Watcher component must be enabled in the Kaspersky Lab product settings.<\/p>\n<p>Using Tor may become commonplace\u00a0for criminals, especially those who operate botnets or encryptors \u2013 i.e. anything that needs command and control servers.<\/p>\n<p>If your house is infested by domestic ants, the only way to exterminate them is to kill the queen which resides in a deep-hidden nest; sometimes it is almost unreachable directly, so poisons must be used to destroy the colony. <\/p><blockquote class=\"twitter-pullquote\"><p>#Tor-enabled #malware may go mainstream soon. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6JDe&amp;text=%23Tor-enabled+%23malware+may+go+mainstream+soon.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The only sure way to dismantle a botnet is to \u201cdestroy the nest\u201d by bringing down its C&amp;C servers (and \u2013 preferably \u2013 apprehend the \u201cant queens\u201d, i.e. the botnet\u2019s owners).<\/p>\n<p>But if (or when) the criminals take their botnet\u2019s C&amp;C infrastructure to Tor it will be infinitely difficult to unroot such a malicious network with a \u201csingle blow\u201d, such as <a href=\"https:\/\/business.kaspersky.com\/hunting-the-hydra-why-gameover-zeus-botnet-is-here-to-stay\/\" target=\"_blank\" rel=\"noopener nofollow\">Operation Tovar<\/a> and other similar botnet-busting. And this, in turn, means that the only way to battle such a botnet is to have a rock-solid local protection that won\u2019t allow any malware through.<\/p>\n<p>In other words, if\/when controlling malware via Tor becomes mainstream, ensuring cybersecurity becomes \u201ceverybody\u2019s own business\u201d more than ever before.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware using Tor for communication with C&amp;C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.<\/p>\n","protected":false},"author":209,"featured_media":15869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,189,36,760,420,558],"class_list":{"0":"post-2382","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-data-security","11":"tag-malware-2","12":"tag-onion","13":"tag-ransomware","14":"tag-tor"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-few-thoughts-on-tor-augmented-malware\/2382\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-few-thoughts-on-tor-augmented-malware\/2382\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-few-thoughts-on-tor-augmented-malware\/2382\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2382"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2382\/revisions"}],"predecessor-version":[{"id":33283,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2382\/revisions\/33283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15869"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}