Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Ransomware adds stronger security and targets enterprise

by The Gurus
November 21, 2014
in Editor's News
Share on FacebookShare on Twitter

After CryptoLocker and CryptoWall collected millions of dollars from its victims, warnings have been made that ransomware is proliferating through new attack vectors.
 
According to a report by Bromium, tactics such as malvertising, anti-analysis and persistence techniques to ensure system compromise are now being used, as well as advanced encryption algorithms.
 
Previously, a primary strength of crypto-ransomware was its ability to use well-known and reputable crypto libraries to perform encryption, and early families such as CryptoLocker and CryptoWall relied on Microsoft CryptoAPI, which may be considered a drawback since it is trivial to hook encryption routines. “That makes early detection easier and allows intercepting session keys. Other families switched to statically linking the encryption functions to address this problem,” it said.
 
Now though, the number and type of targeted files continues to grow as attackers carefully select which files to encrypt, and targeted files are not random and the latest crypto-ransomware families are aimed at enterprises and look for databases, CAD files and financial data.
 
Bromium said that the samples it analysed used fairly complex obfuscation and covert launch techniques, which allowed them to evade detection in the early stages of infection.
 
Rahul Kashyap, chief security architect at Bromium, said: “Crypto-ransomware is a particularly devious attack because of its potential to cause financial losses and irreparable damage to organisations that cannot access critical files.
 
“Crypto-ransomware lacks the subtlety of Trojan attacks that evade detection during infection, openly flaunting its compromise and demanding payment since antivirus is unable to reverse the process.”
 
The research found that the ransomware could be found by anti-virus, so now the communication protocols have evolved from plaintext (HTTP) to encrypted (TOR, HTTPS) and as a result, C&C domains changed from those based on a domain name generator algorithm (DNGA) to hardcoded URLs since encrypted communication is harder to track during efforts to take down servers.
 
However, apart from several flaws found in early samples of CryptoWall and TorrentLocker, the cryptography is common and appears to be implemented “by the book”, apart from CryptoWall, which encrypts whole files with RSA. “It is worth noting this process is quite intense on memory and CPU, which might be used as a behavioural detection indicator,” it said.
 
Bromium said that it is likely that we will see more crypto-ransomware families, and the threat will not go away anytime soon. “The only way to make it go away is to stop paying, thus rendering its business model unprofitable. But this unfortunately is much easier said than done,” it said.

FacebookTweetLinkedIn
Tags: BitCoinCrimeEncryptionRansomware
ShareTweetShare
Previous Post

Citadel Trojan adapted to target password managers

Next Post

When was the last time someone built a security protocol that made it easy to use?

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information