{"id":5541,"date":"2016-05-05T15:16:57","date_gmt":"2016-05-05T15:16:57","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5541"},"modified":"2020-02-26T11:09:12","modified_gmt":"2020-02-26T16:09:12","slug":"ransomware-surprising-champions","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ransomware-surprising-champions\/5541\/","title":{"rendered":"Ransomware: surprising champions"},"content":{"rendered":"<p>5:50 pm, Friday, late Spring; as usual the atmosphere in the office is somewhat relaxed: people will soon go home or to some more entertaining places, and no one expects any trouble. But trouble comes uninvited \u2013 some accountant calls out for admin saying they cannot open their files and the filenames start looking weird. And what is that announcement pop-up saying something about a ransom?<\/p>\n<p>At this moment, you don\u2019t want to be that admin, the accountant, or the company owner, especially if it is a small or medium business, because someone made a mistake and let something bad in.<\/p>\n<p><strong>\u201cCreepy, crawly\u2026\u201d<\/strong><\/p>\n<p>Every\u00a0month, it seems, we have to talk about ransomware. It\u2019s barely surprising, given that new strains arrive in troves. Businesses of all kinds are targeted, and SMBs are threatened in particular because they may already have financial resources attracting the criminals, yet still tend to save on security and IT staff for various reasons.<\/p>\n<p>The once dreaded Cryptolocker and Teslacrypt may no longer make headlines, but they are still around and as dangerous as before. There are some surprising newcomers, such as Locky and Petya.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Ransomware: surprising champions #locky #petya<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FCk6p&amp;text=%23Ransomware%3A+surprising+champions+%23locky+%23petya\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>God of no-jokes<\/strong><\/p>\n<p>\u201cLocky\u201d (Trojan-Ransom.Win32.Locky) is a nasty ransomware that inflicts a lot of damage worldwide. It\u2019s not much different from other ransomware families in regards to internal arrangement or its principles of operation, but it uses strong encryption algorithms and is very active and widespread: Kaspersky Lab\u2019s products have blocked its attacks in over 100 countries around the world. No other ransomware Trojan has attacked so many countries at once \u2013 successfully attacked, by the way.<\/p>\n<p>Its success is, in fact, a very weird thing. Locky\u2019s main attack vectors are nothing new. Successful infections in most cases are the result of victims\u2019 mistakes and basic cybersecurity rules violations.<\/p>\n<div id=\"attachment_5543\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-5543\" class=\"size-full wp-image-5543\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020526\/main-1.jpg\" alt=\"Shouldn't be that way\" width=\"1000\" height=\"667\"><p id=\"caption-attachment-5543\" class=\"wp-caption-text\">Shouldn\u2019t be that way<\/p><\/div>\n<p><strong>\u2026Of thing that should not be<\/strong><\/p>\n<p>Locky gets around via spam. Perhaps, it\u2019s the exact reason for its success: it\u2019s being seeded around vehemently. Its attack is two-staged: a malicious letter with downloader, then the Trojan itself.<\/p>\n<p>In\u00a0the early stages (i.e. around February this year) the Trojan downloader was delivered in a .doc file with a macro which downloaded the Trojan. And that\u2019s where it becomes somewhat ridiculous: Microsoft has long deactivated the automatic execution of macros in Microsoft Office for security reasons. But users often enable the macros manually, including for files arriving from unknown\u00a0sources.<\/p>\n<p>Now, attackers have changed tactics. Instead of mass-mailing .doc files they now serve .zip archives containing .js scripts.<\/p>\n<p><strong>Not ridiculous in fact<\/strong><\/p>\n<p>For experienced users a .doc file from an unknown source which \u201crequires\u201d macros to be enabled is an immediate red flag. A javascript file with a \u201crun me\u201d label is a red flag as well. But, again, it takes an employee to know what files have .js extension, and why macros can be dangerous.<\/p>\n<p>Then imagine there\u2019s a small company where at least some employees (accountants, for instance) have little to no passion about all of that computer stuff, and no interest in cybersecurity whatsoever. They might have heard something about how macros shouldn\u2019t be enabled. Or they might not. Anyway, .js extension is only familiar to advanced PC users. For the rest, it only takes a smartly crafted letter to fall into a criminal\u2019s trap.<\/p>\n<p>Most likely, this was the Locky author\u2019s primary idea: technically-advanced PC users would delete suspicious letters on sight, whether they have .doc, .zip or .js attachments. But when you are targeting users with little knowledge about file types and substandard cybersecurity awareness, it makes little difference in what form the malicious payload is delivered.<\/p>\n<p><strong>Un-saint Petya<\/strong><\/p>\n<p>Another dreaded spawn of ransomware pandemonium caused a lot of trouble in Germany earlier this year. Codenamed Petya, this one encrypted not specific files, but the very master file table on compromised machines, and then demanded $400 in Bitcoin.<\/p>\n<p>It was also spammed out \u2013 mostly to human resources organizations across Germany. The emails contained a link to a Dropbox file that, if clicked, loads a dropper which installs Petya. Dropbox has long since removed the link and several others that were associated with the same malware.<\/p>\n<p>In a sense, Petya (a pet form of Russian name \u201cPyotr\u201d, a counterpart to Western \u201cPeter\u201d), is a bit more technically advanced\u00a0than Locky (and its authors are definitely more inventive).<\/p>\n<p>Again, it would only inflict damage if a victim cooperates, and does that in a hardcore way. Have you ever heard of an applicant CV in the form of an executable file which demands administrator privileges?<\/p>\n<p>https:\/\/cdn.securelist.com\/files\/2016\/04\/petya_eng_1.jpg<\/p>\n<p>Petya\u2019s dropper would only go on if the users click \u201cYes\u201d on a UAC pop-up window.<\/p>\n<p>And this is in fact possible if the user isn\u2019t experienced enough\u2026 or too tired to pay attention to pesky UAC warnings.<\/p>\n<p>With HR workers who have to sift through literally hundreds of unexciting CVs per day, this is a very possible scenario \u2013 especially on Friday at 5:50 pm\u2026<\/p>\n<p>Still Petya isn\u2019t as terrible as it is painted: its encryption algorithms proved to be vulnerable to decryption (unlike those of Locky). <a href=\"https:\/\/business.kaspersky.com\/ransomfails\/5470\/\" target=\"_blank\" rel=\"noopener nofollow\">We\u2019ve covered this recently<\/a>.<\/p>\n<p><strong>If you can\u2019t beat it, prevent it<\/strong><\/p>\n<p>As with many other threats, preventing ransomware from getting in is the way to go for businesses of all kinds. Ransomware\u2019s damage is extremely hard to fix, unless you\u2019re willing to have a budget for a \u201crainy day\u201d when the only remaining option for retrieving files is paying the ransom.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Even quite dumb ransomware can be very successful. But it shouldn\u2019t necessary be so. #locky<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FCk6p&amp;text=Even+quite+dumb+ransomware+can+be+very+successful.+But+it+shouldn%26%238217%3Bt+necessary+be+so.+%23locky\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There are a number of safety preventive measures to be taken against ransomware.<\/p>\n<p>First and foremost, educate employees about social engineering, kinds of threats, the perils of infected websites, types of files, etc. They must know that .exe and .js are by no means document files, and that even .doc files coming from uncertain sources aren\u2019t to be launched without a thorough check-up.<\/p>\n<p>Second, it is useful to limit the possibility of launching anything at the endpoints. Unless a given employee knows exactly what he or she is doing, administrative privileges shouldn\u2019t be accessible.<\/p>\n<p>And of course there should be a full-range security solution that is capable of stopping ransomware attacks before the encryption happens; this would include anti-spam and modern security tools for both workstations and file servers capable of proactive defense against known and unknown threats. Check out Kaspersky Lab\u2019s offerings for <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-business\" target=\"_blank\" rel=\"noopener nofollow\">small<\/a> and <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">small-to-medium<\/a> businesses, as well for the <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\" target=\"_blank\" rel=\"noopener nofollow\">larger entities<\/a>.<\/p>\n<p>More details about Locky are available <a href=\"https:\/\/securelist.com\/blog\/research\/74398\/locky-the-encryptor-taking-the-world-by-storm\/?utm_medium=blg&amp;utm_source=kb_post_160505&amp;utm_campaign=ww_beating_cryptors\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n<p>A detailed analysis of Petya is available via this <a href=\"https:\/\/securelist.com\/blog\/research\/74609\/petya-the-two-in-one-trojan\/?utm_medium=blg&amp;utm_source=kb_post_160505&amp;utm_campaign=ww_beating_cryptors\" target=\"_blank\" rel=\"noopener\">link<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>Locky and Petya ransomware strains took the world by storm when they shouldn&#8217;t be successful at all.<\/p>\n","protected":false},"author":209,"featured_media":15354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1504,1511,420],"class_list":{"0":"post-5541","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-locky","10":"tag-petya","11":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-surprising-champions\/5541\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-surprising-champions\/3757\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-surprising-champions\/6305\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-surprising-champions\/5541\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-surprising-champions\/5541\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/locky\/","name":"Locky"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5541"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5541\/revisions"}],"predecessor-version":[{"id":33688,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5541\/revisions\/33688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15354"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}