Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Keep your friends close; keep ransomware closer

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Keep your friends close; keep ransomware closer


๐Ÿ’ก Newskategorie: Malware / Trojaner / Viren
๐Ÿ”— Quelle: blog.virustotal.com

โ€œHow to avoid being a ransomware victim?โ€ is one of the main questions every single company and organization asks themselves every day. Unfortunately there is no silver bullet against that, but there are several good practices we can follow to minimize our exposure.

We can start by enumerating what are the main vectors that attackers use to get into victims: phishing, brute forcing and the use of exploits. Let's use this information to understand what exactly are attackers doing from a technical point of view, but more importantly, to monitor how their campaigns evolve. And here we want to highlight the importance of continuously tracking malicious activity in order to feed our systems accordingly: attackers evolve their methods and the IOCs used constantly change. We need the whole movie, not just a static picture.

This post describes different examples of techniques we can use to monitor ransomware campaigns, with a special focus on the infection vectors previously mentioned in order to minimize the risk of becoming a victim.

For more details, you can check our recorded anti-ransomware webinar in English and Spanish.

Ransomware in phishing attacks

Phishing is the most common technique used to distribute ransomware. We want to be able to discover how it is being used in new ransomware campaigns and to obtain the infrastructure behind the attack, gathering valuable IOCs and TTPs to feed our defenses.

We can start looking for emails involved in phishing campaigns uploaded this year to VirusTotal:

engines:ransom type:email fs:2020-01-01+

We get a list of generic ransomware email files. We can specify a certain malware family we are interested in. For instance, the following query returns emails related to some of the most common campaigns:

(engines:bitpaymer OR engines:maze OR engines:Ryuk OR engines:gandcrab OR engines:clop OR engines:revil OR engines:sodibiniki OR engines:matrix) type:email

Trickbot is a malware family frequently used to deliver ransomware. By searching for recent samples delivered by email (engines:trickbot fs:2020-09-01+ type:email) we can quickly find an interesting sample implementing an exploit and pretending to be a well known financial institution. We can quickly expand all the domains, URLs and IP addresses embedded into this file into our investigation graph, getting a broader overview of the campaign:


Expanding different nodes uncovers new IOCs to feed our defenses and unfolds this campaign, showing domain names that were used to bait victims into opening the malicious word document attached to the phishing email.


This kind of phishing attacks where legitimate logos, domains and brand images are used to bait victims into executing malware can hurt a company's reputation, not to speak of being used against the company itself. The sooner we detect a campaign the faster we can perform actions to shut it down. VirusTotalโ€™s Livehunt checks any submitted file against a search criteria written in Yara.

For example, to check for embedded domains in emails detected as phishing, we could use:

import "vt"
rule brandmon_google {
ย  ย  strings:
ย ย  ย ย ย  ย $domain1 = "accounts.google.com"
ย ย  ย ย ย  ย $domain2 = "mail.google.com"
ย ย  ย ย ย  ย $domain6 = "drive.google.com"
ย ย  ย condition:
ย ย  ย ย ย  ย for any engine, signature in vt.metadata.signatures : (
ย ย  ย ย ย  ย ย ย  ย signature contains "phishing" and vt.metadata.file_type == vt.FileType.EMAIL and (any of them)
ย ย  ย ย ย  ย )
}


Exploits used in ransomware attacks

Exploits are commonly used for installing malware or for escalating privileges into your system.

According to this report, the four CVEs that are most frequently used for performing ransomware attacks this year are:
  • CVE-2019-19781 โ†’ Revil/Sodinokibi, Ragnarok, DopplePaymer, Maze, CLOP y Nephilim.
  • CVE-2019-11510 โ†’ Revil/Sodinokibi y Black Kingdom
  • CVE-2012-0158 โ†’ EDA2 y RASOM
  • CVE-2018-8453 โ†’ Revil/Sodinokibi
We can add to the list a couple of recent remarkable exploits: zerologon (CVE-2020-1472) and SMBGhost (CVE-2020-0796). We observed several ransomware lookups in VirusTotal tagged with this last vulnerability during the last months:




We could use the following query to get more detailed information about what CVEs were used in ransomware attacks during 2020:

engines:ransom tag:exploit fs:2020-01-01+ tag:CVE-2020*

We can once again filter by malware families. For instance, the previous query is mostly GandCrab malware, which can be easily checked using the query: (engines:ransom and not engines:gandcrab) tag:exploit fs:2020-01-01+ tag:CVE-2020).

Now, we are ready to create a Livehunt rule to find new files tagged with one of the exploits frequently used by ransomware.ย 

import "vt"
rule ransomware_exploits {
ย ย  ย condition:
ย ย  ย ย ย  ย for any tag in vt.metadata.tags : (
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2019-19781" or
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2019-11510" or
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2012-0158" or
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2018-8453" or
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2020-1472" or
ย ย  ย ย ย  ย ย ย  ย tag == "cve-2020-0796"
ย ย  ย ย ย  ย ) and not vt.metadata.file_type == vt.FileType.CAP
}

This will result in an immediate notification, allowing us tracking any new IOCs we can use to protect our system.

More importantly, this is very valuable information we can use on a regular basis to manage our patching policy, prioritizing patches based on fresh data of how different exploits are being used in real attacks.

Tracking fresh campaigns

Now, we want to make sure that we monitor any new ransomware campaign in order to understand how it evolves and what new artefacts and techniques they use.

As an example, we can start with a recent DFIR Report investigation revealing Ryuk exploiting zerologon. There are many ways to track campaigns, however VT Graph is a great choice to get together all the discovered observables and extend our knowledge in a visual way. Here are some tips that could help you during this process:
  • Start by adding all the known observables to a new VT Graph.
  • Expand domains, URLs and IPs to unfold relations and obtain new observables.
  • In order to keep our list of observables up to date, we can translate common Yara rules into Livehunt rules to catch new files, injecting Livehunts results directly into the graph.
  • Additionally, we can use Retrohunt rules to look for similar samples in our collection.
We start the investigation dropping one of the files included in the publication in a new graph, showing domains, urls and ip addresses embedded in the file, ITW URLs hosting the file and network observables contacted by this sample when executed. This file is detected as โ€œbazarโ€ malware, used to install Ryuk. We dropped all this information in our graph:



Additionally to keep pivoting using our graph and indicators, we can also translate the Yara rules from the DFIR report into Livehunt rules.




We can integrate Livehunt results into our graph in just two clicks. Just click on the target icon at the right in the VTGrap interface, select the rule desired and choose "Load results". This will add all the new observables that match our rules to the current graph. We can expand these new nodes aggregated to unveil new observables and create relationships.



All these new IOCs are fresh observables that are clearly related to this campaign. All this continuous flow of fresh indicators will help us improve our security mechanisms to stop Ryuk from passing through our defenses.


Summarizing, the knowledge of what attackers are using is the first necessary step for us to minimize our exposure to different campaigns. It wouldn't be right to put all the different ransomware attacks under the same umbrella, as they became highly specialized and protecting from different actors is not exactly the same. The techniques described in this post are a good starting point for automatically minimizing our exposure to more spread ransomware campaigns, however they can be applied both for generic and targeted attacks.

Stay safe and happy hunting!

This post was co-authored byย Vicente Diaz.
...



๐Ÿ“Œ Keep your friends close; keep ransomware closer


๐Ÿ“ˆ 61.81 Punkte

๐Ÿ“Œ Equifax Hack: Keep Your Friends Close, but Your Supply Chain Closer


๐Ÿ“ˆ 53.44 Punkte

๐Ÿ“Œ Keep Your Friends Close and Your Identity Closer


๐Ÿ“ˆ 53.44 Punkte

๐Ÿ“Œ <self-close /> or <not-to-self-close></not-to-self-close>


๐Ÿ“ˆ 36.73 Punkte

๐Ÿ“Œ FreeBSD 11.0 Is Getting Closer and Closer, Fouth Beta Out Now for Public Testing


๐Ÿ“ˆ 28.15 Punkte

๐Ÿ“Œ FreeBSD 11.0 Is Getting Closer and Closer, Fouth Beta Out Now for Public Testing


๐Ÿ“ˆ 28.15 Punkte

๐Ÿ“Œ Amazon CTO Vogels: Cloud is getting closer and closer


๐Ÿ“ˆ 28.15 Punkte

๐Ÿ“Œ #BeCyberSmart โ€“ why friends donโ€™t let friends get scammed


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ Phone scamming โ€“ friends donโ€™t let friends get vished!


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ Humble Choice for November has Prodeus, Hardspace: Shipbreaker, Friends vs Friends


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ Friends - The Reunion: Das mรผsst ihr รผber das neue &quot;Friends&quot;-Special wissen


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ How to create a close friends list on Instagram


๐Ÿ“ˆ 24.97 Punkte

๐Ÿ“Œ How to create a close friends list on Instagram


๐Ÿ“ˆ 24.97 Punkte

๐Ÿ“Œ Oracle Hyperion Financial Close Management 11.1.2.4 Close Manager unknown vulnerability


๐Ÿ“ˆ 24.49 Punkte

๐Ÿ“Œ Oracle Hyperion Financial Close Management 11.1.2.4 Close Manager unknown vulnerability


๐Ÿ“ˆ 24.49 Punkte

๐Ÿ“Œ Google Contemplating Removing Chrome 'Close Other Tabs' and 'Close Tabs to the Right' Options


๐Ÿ“ˆ 24.49 Punkte

๐Ÿ“Œ Chrome May Soon Lose "Close Other Tabs" and "Close Tabs to the Right" Options


๐Ÿ“ˆ 24.49 Punkte

๐Ÿ“Œ Close to the Sun Xbox One review: It doesn't fly close enough


๐Ÿ“ˆ 24.49 Punkte

๐Ÿ“Œ New Ransomware Threatens to Send Your Internet History & Private Pics to All Your Friends


๐Ÿ“ˆ 24.18 Punkte

๐Ÿ“Œ Keep hackers (and friends) from using your Hulu and Netflix accounts video


๐Ÿ“ˆ 23.62 Punkte

๐Ÿ“Œ Keep all your electronics close by with this discounted travel organizer


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ Keep your data close with Seagate's Backup Plus Slim 2TB drive down to $46


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ Keep your data close with $10 off the WD My Passport Ultra 1TB hard drive


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ Grab Samsung's T7 Touch portable SSD for $20 off and keep your media close


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ Keep your media close with Seagate's One Touch 1TB hard drive down to $50


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ Save $70 on Seagate's One Touch 2TB portable SSD and keep your data close


๐Ÿ“ˆ 23.14 Punkte

๐Ÿ“Œ This ransomware will share your browser history with friends


๐Ÿ“ˆ 20.69 Punkte

๐Ÿ“Œ New Ransomware Offers The Decryption Keys If You Infect Your Friends


๐Ÿ“ˆ 20.69 Punkte

๐Ÿ“Œ New Ransomware Offers The Decryption Keys If You Infect Your Friends


๐Ÿ“ˆ 20.69 Punkte

๐Ÿ“Œ How to Keep Streaming Friends on Netflix from the US


๐Ÿ“ˆ 20.13 Punkte

๐Ÿ“Œ Mojang listens to us, makes Minecraft wolf armor more protective (and colorful) to keep our furry friends safe


๐Ÿ“ˆ 20.13 Punkte

๐Ÿ“Œ I put Linux on my friends' laptop as a placeholder, and he chose to keep it over windows (story time)


๐Ÿ“ˆ 20.13 Punkte

๐Ÿ“Œ Even if youโ€™re off social media, your friends could be ruining your privacy


๐Ÿ“ˆ 19.72 Punkte











matomo