What is Ransomware?
There isn’t just one type of Ransomware that you need to protect yourself against there are many different types or flavors and they behave differently. But they typically encryprt your files and then demand a ransom in bitcoin so it can’t be easily traced. Some of examples are Locky, Cryptowall, CryptXXX, Jigsaw and TeslaCrypt. To date, according to Kaspersky Labs, Ransomware is a very small fraction of the malware attacks that it encounters. But it can be one of the more expensive viruses if you get hit and you have no backups so it pays to plan ahead. This is our attempt at getting ahead of the game and we hope you can learn something too.
Each of the machines we tested was first wiped and then Windows 7 was reinstalled. Ransomware needs to talk base to base so you’re going to need an internet connection. To minimize the risk of infection use a dedicated wifi hotspot or a burner phone. In our case we used a cheap Android test phone with a Ting sim card and a data plan.
You can find many of the different flavors of Ransomware that have been collected in the wild at https://github.com/ytisf/theZoo
Download the files by using the git clone command. Choose which flavor of Ransomware you want to begin with from the binaries folder and then run the executable. The password to unzip the file should be in the same folder. Warning: do not do this on a machine you ever want to use again and make sure it is not connected to your wifi.
For our first test we infected a PC with the Jigsaw virus which you can find in the Ransomware.jigaw folder. Figure 1 shows the desktop before it’s infected. It has a number of text docs and images saved on the desktop.
Install Jigsaw. The ransomware doesn’t start the encryption process right away. It’s triggered when a user opens a text file when you’re notified that the file doesn’t exist and then Jigsaw opens its own window asking for payment. Figure 2 shows the Jigsaw screen demanding a bitcoin payment of $150.
Figure 3 shows the desktop after the files have been encrypted.
Not every flavor of ransomware has a corresponding tool that will decrypt the files. However Jigsaw has been around for a while and thankfully someone has figured out how to fix it. Download the tool from https://www.bleepingcomputer.com/download/jigsaw-decrypter/dl/321/ and run it on the infected computer.
Point the tool at the directory you want to decrypt. Figure 4 shows the Bleeping tool in action.
Once it is finished, copy everything off the desktop you want onto a USB. The PC is still infected so reinstall Windows 7 using a bootable CD or USB before you try another type of ransomware.
Ransomware: Social Engineering
Ransomware is usually introduced into your network by someone clicking on a link or email attachment. It just takes one employee to click on a link and the Ransomware can begin to take hold. A good way of train your users is to send them a practice phishing email and see who clicks on the link. There are several websites that will do that for free and then upsell you other services such as https://www.knowbe4.com/phishing-security-test-offer Using one of these free trials is a great way to begin to see where the cracks are in your organization.
Ransomware: Preparation Plan
Our Ransomware computer lab is just one attempt at getting ahead of a ransomware attack. Here’s our top 10 recommendations for a Ransomware Preparation plan that you should implement.
1. Last Friday was National Backup Day. Take the hint, backup your data and keep a copy offsite.
2. Disconnect from all cloud backup services such as Dropbox. Sync each day if you must but don’t keep it permanently connected, otherwise it’ll get infected during an attack.
3. Use Antivirus, Firewalls and Email scanners.
4. Update your OS when a new patch appears.
5. Make sure you’re using Microsoft’s shadow drives (VSS) or Mac’s Time Machine.
6. Uninstall Flash.
7. Remove or restrict Admin access.
8. Disconnect any shared drives.
9. Train your staff, send them test phishing emails
10. Use a test lab and see if you can recover from a simulated attack.
Before you go
If you want to see more results than feel free to join us at our Tech Takeover at Automation Alley where we show what happened with the other strains of Ransomware. Click here to sign up https://www.automationalley.com/Events/Calendar/Event-Detail.aspx?uniqueid=28276