Hopefully, it's not coming to a computer near you...





*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




*From:* CyberheistNews [mailto:[email protected]]
*Sent:* Tuesday, December 09, 2014 9:48 AM
*Subject:* Heads Up! New Hybrid Ransomware Replicates Like A Virus



Heads Up! New Hybrid Ransomware Replicates Like A Virus

Email not displaying correctly?
View Knowbe4 Blog
<http://pstemail.knowbe4.com/wf/click?upn=GlSU3epPktoVcX9ru0A6cvZcCKOtY3dgZDI2h8kQ4Jw-3D_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbV8uD-2FcvGw6WiXUbe5sya36bG-2FypYb8nsggVufbEOMRC3d1IBNhGhOik15wMt67VpOuDiW20i84a-2F5zvePnpqd3aV2K1BKpB1rKL-2FKztRQNTq34mi00eG-2FbSngDP1qaM2I3mp699OT6bpbtp25F25dzXiTnFqRo6pTJI0Ii1niOOTjc-2FmKc2FI04SwVMSIH0OwagifpiFuc2LtYs47s1pa7E77fgZE7bHspFcGi2xk-2BvtvTQxU8Pp6j92KD0prxesjc5AwlXMtGOSY7Y3Boj-2FJYz6W8-2BS0r2NHBudZUcpGwX9Q5rAoddgt3QeeLIKJOlMAFBt8zScA8ZvZIzUKunjTMI1XF-2Fy-2BcvzY7vI5rajclZw-3D>.


 CyberheistNews Vol 4 #47 Dec 2, 2014
               Heads Up! New Hybrid Ransomware Replicates Like A Virus

Here is a powerful piece of ammo to get (more) IT Security budget.
SophosLabs labs' blog reported about a new Ransomware strain with a
difference - this one is a true self-replicating parasitic virus! They call
it VirRansom.

This new strain is a hybrid that combines CryptoWall-like functionality
with active self-replicating virus infections of all files it can find. And
like the cybercrime Reveton family of malware, it locks the PC's main
screen demanding 0.619 Bitcoin to let you back in. Yikes.

Let me quote Sophos for a moment: "Worms vs. Parasitics: Most worms leave
you with one, or perhaps a handful, of infected files that weren't there
before and need to be deleted.

"Parasitic viruses, in contrast, may leave you with hundreds of infected
files on each computer, or thousands, or more. If you leave even one of
those infected files behind after a clean-up, the infection will start up
all over again.

"Worse still, the infected files can't just be deleted, because they are
your own files that were there before the infection started. That makes
cleanup much trickier."

*The good news:* The file encryption is not as advanced as CryptoWall, as
the key to decrypt the files is contained in the malware itself. Your
antivirus should soon be able to decrypt the files and restore them, unless
the bad guys are constantly changing the encryption keys in which case it
may take a day or more before your AV catches up.

*The bad news:* This is a full-fledged virus which will spread across your
network and doing a less than perfect job on the disinfection can easily
lead to reinfection of your whole network.

CryptoWall-encrypted files that you can't or don't decrypt are harmless
garbage forever, but you can delete them. With VirRansom, files that you
don't decrypt are still recoverable, but also still actively infectious.

It gets nastier all the time. You can expect a VirRansom 2.0 soon where
they might implement "new features" like industrial-strength encryption
like CryptoWall where you only get the decryption keys after payment, and
things like infection of your email server, where emails are converted to a
worm for maximum dissemination of their malcode. (Think about the legal
ramifications of something like this.)

You can mitigate these types of threats through both technical measures and
enforcing security policy. First some technical approaches:

·         The very first thing you need to do is test the Restore function
of your backups and make sure it works. And have a full set of backups
offsite.

·         Start thinking about asynchronous real-time backups so you can
restore files with a few mouse clicks.

·         Get rid of mapped drives and use UNC links for shared folders.

·         Whitelisting software, which only allows known-good executables
to run, starts to look more attractive by the month.

Looking at the security policy angle, it's time to enforce best practices,
and one of those is of course prevent these types of infections to begin
with, through effective 5-th generation security awareness training, as the
infection vector is your end-user opening up an attachment or clicking on a
link. Find out how affordable this is for your organization. Get a quote
now:
http://info.knowbe4.com/kmsat_get_a_quote_now
Shipping Problem Phishing Attacks - Here Is How They Look

Last CyberheistNews issue, we warned that Black Friday and Cyber Monday
were behind us, and that criminal hackers have a "scam calendar" which
focuses on major shopping events exactly like this. Here are 4 actual
examples of these online e-commerce order or package shipment phishing
attacks that have come in over the last week. The first one is a bogus Home
Depot order that they want you to click on and make your PC into a botnet
zombie. Images at the full blog post here:
http://blog.knowbe4.com/shipping-problem-phishing-attacks-here-is-how-they-look
How Was Sony Pictures Hacked?

Kevin Mandia, who was hired as the forensics expert wrote in a letter to
Sony's CEO that the breach was unprecendented, well-planned and carried out
by an "organized group". It's the most destructive cyber attack reported to
date against a company on U.S. soil.

As Terabytes of data were exfiltrated, there will be a treasure trove of
confidential data which will be leaked over the next weeks or months. But
how was Sony hacked? The Grugg recently tweeted: "Well, pretty much every
single hacked network in the news can be summarized: 'It started with an
email...'" I would not be surprised if this was the case with Sony as well.

While security experts have been able to test the wiper malware employed
against Sony Pictures Entertainment, they say they have not yet exactly
determined how the malware infected Sony in the first place. "My educated
guess would be that someone was targeted [with] a spear phishing e-mail,
which granted access to a system," Tom Chapman, director of the
cyber-operations group at cybersecurity firm EdgeWave, tells Information
Security Media Group. "The hacker(s) then escalated privileges and took
control of the mail server and possibly the Active Directory. From there,
the hackers owned the system."

The attackers appear to have had an edge, in that they seem to be very
familiar with Sony's network topology. "We have been investigating the
attack and discovered new pieces of malware that are likely related to the
same attackers," says security researcher Jaime Blasco, labs director of
security management and threat intelligence vendor AlienVault. "From the
samples we obtained, we can say the attackers knew the internal network
from Sony since the malware samples contain hardcoded names of servers
inside Sony's network and even credentials/usernames and passwords that the
malware uses to connect to system inside the network."

The North Koreans are highly likely to blame. You might think that a
country that has problems delivering enough electricity to its citizens
would not be that sophisticated, but their hackers are trained by the
Russians and the Chinese and Pyongyang runs some of its hacking operations
out of a luxury hotel in nearby Shenyang, China.

It is obvious that Sony's defense-in-depth security policy was deeply
flawed in either incorrectly stating the right procedures or failing to
enforce them. Not having the breach detection tools in place to spot
terabytes of data leaving the building is another epic fail. More:
http://www.cuinfosecurity.com/sony-hack-destover-malware-identified-a-7638



Warm Regards,
Stu Sjouwerman



   ------------------------------



*You can read CyberheistNews online at our Blog!*
http://blog.knowbe4.com/cyberheistnews-vol-4-47-new-hybrid-ransomware-replicates-like-a-virus



<http://pstemail.knowbe4.com/wf/click?upn=pteXiMiziaLeYAg4TemIoCDpO8-2B7iBFaiTNVANVADShPyKESzQPJ9IhpTaevm6ec_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbV35x7fTWJu-2FVE0gYnuvlhGIu3UIn3VOUM8JLDN6YG41cmNiLjuo0n1l3Jg9VsutkcKOYkkP847ORivXs2Ns-2FexIA6jDwUibMh8-2BWUObApH8Cr-2BK6vGVw0-2BJfY-2FA9FTpNYBT8gnCSynIh7q5AjKiQKudnxLeSJocJPzP7hoF4JNUQhYss6ZT-2FBMes6XDy-2F5IErBNelWvaPsCZvhD24DJ33cyPTM561ympee9a8Q-2Fj-2FX2mbCtEgGmZrVHI2nPDGW8fzTWXtuhPyYbWpGmEOsJThnrhfEjwBTZLfKyokSQkQSdxe-2FHEqgdyb1ffXWuJXZCjMg96-2F5v-2BeLeXRzqvnAXJcmh-2BgxLJPRlBAQ6O7L7BsLzY-3D>

<http://pstemail.knowbe4.com/wf/click?upn=3hy3XqoP1MJTqPfxNiU0GdDYazEw-2FNZ1PU9Emmphl6pH6-2Fi53KoTakt4ECAGBspv_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbVVJJwIMh7DO7WEBz-2B4VLlxBXZ4whOXibQOuH-2BcqFllPJfVXsJ38tAW8u5s1pltVDAs9dCLydLpMM8Zk-2Btk9n1VNvtVzYc33apDNNt9voYZeWnzk2ttnCBA7Xb5gn45z12x41-2B42IuxGmSq9V34jVBgZymATh-2FMOD3DmqC81Zrxxpe898cX3rGLBw4DKX-2FnZS-2F1Lkid2FAfjlpF-2FRZf9DSf1Td7QLwXBz3C2kPuuxtV5PCyFgGygbwsWP-2FkAQRiI1vWasBeDH7liACusDpeIIou4ISEh99e0CDzOAfI6MvPZJ7vNp-2Bf88VyS-2FXRY92F2YU5jZdIrxDlCYxl3Izqwqe2GeMgpr1mvVbxr-2F7YiD2v8g-3D>

<http://pstemail.knowbe4.com/wf/click?upn=GlSU3epPktoVcX9ru0A6cjQQDTxdswB3T3hRciTvMMDdTzgGgXJjOosM-2FT8H0CSn_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbVdLTs7qBqdWYoZPpvaHy4ItLTB-2BMN0IAgg6r-2FV4WGVEdBVcEUSc-2BL5y1mrmqfCHyH1E4PwS-2B59boecQp3FmN3HK5BrMCq2sh2zXMwAoq26WxIaPi-2BxQdxsMvs5Nzv7W7NqhXMzocKQDPaqt93FJqVUQSOeWpB2yRmpF1GmsvD2ZtOT5FpiKZgAH1l8IlRTLUivbD34K7A3JC4lVdFOCCK5X5BZrH-2F3en5pIKOiSI-2BUEPtf6jBwNloe-2B-2BVG5BWKCXViUvc0dErLmzYagWCqgRn28JJezlaY-2F1aR-2FInsQHN8Vd7aPSJAwjaDbVqHTt7yNILdqcrF03i4p8mYA2F2wf8Cwq1TXvTftYvYzxT-2F4hwXv4-3D>

<http://pstemail.knowbe4.com/wf/click?upn=IzCrZ1f3Og7edPtesm1V5NUfp8w6ZL6UEPOS-2FIlCbo0lCrIsBHMfPLPOhEDo8remqVblYnZrlWjUS4vi88zMWg-3D-3D_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbVMjIhOd6Tp419WnNUes-2BCUk53xqSY8y9ZGZ9FEpyMQkyi6u6uRDOSBAA5kpXhpSbQjPGXNSbLXShnRD4KzJgzckOdmwHxZSVqa29TtPJfKSztRWCH0ztOeRSz2xO6e9Oo7Fd-2Frq3IoHfTDC-2FSdH-2B4nsD9jCbZ4WmusqPNOp0sK-2Fre4VA0awP8Dn-2FSLP6s1JYgUbfC7csc-2Fu4F7bUkptIyb9skwpTDarLKNNkQV5Qy0mlMOASrNlu0FL95qdIssfj-2BgXvPuGcjeOsN2I-2F18-2Bu-2FJw7udNbW5g9FRMtJw-2BaCrloOAPbO4xNtyiP3sUbe2Dvusf75EbhajaiCG7Vb3VT7XQ8q0QbLwaY5K4nuF8mOcyE-3D>

<http://pstemail.knowbe4.com/wf/click?upn=3hy3XqoP1MJTqPfxNiU0GauZWf0R-2BFeWxZAU-2FI2VwL-2BpQR7uQCXbEXPVqiHoBBxG_zw5B0-2Bx3g-2F532TaOtoISMiBzDcKf38jSo86Q1WEpTeDJTXbgGoFVGYd7BOVnEjbVmqrF6KFKB0tWYw2kOcuhZK9UWRG4aSMRasXY2ecGAgB6Dw02PVGlIgr9NwCad5XapXXpK6G8c8PjZaNxHrbbjD0SiA1asQH-2BQNA7MgF0hS5S3CG1l7P8-2BGpr-2BFWIjfiwgin5-2BnIXrL9R13imuvtTCk3r0E7mv59hrlRMX07bW27db9bHj7UrGsDbAp498kRPiaAh-2FvK-2BXtRn0BbSKglyPRTePgzeOruyvLJoqsdpi-2BKpTLAp-2BcFZB5GFDhmSBV8n6CjvlFoH-2FPgrI-2FbD1sH3qtqcWUkXpmmmcaKg7CMhrdUAJrXm6AR0BIolrRyOY3SjgwrD5EkV5BSTatncBCT3U5VECz9DmRJutmYLiLdM4W8-3D>


*Copyright (c) 2014-2015 KnowBe4 LLC, All rights reserved.*


*Our mailing address is:*
601 Cleveland St. Suite 930, Clearwater, Florida, 33760

Reply via email to