The Evolution - of Ransomware
The Evolution - of Ransomware
The Evolution - of Ransomware
Today’s ransomware gangs are more dangerous and prolific than ever before.
Worse, they keep moving the goalposts with new techniques and approaches
as the attacks prove to be increasingly lucrative.
The reason for the growth is obvious: It’s a lucrative game. Data from “Some ransomwares, such as Maze and Snake, use sandbox detection and
NinjaRMM’s 2020 Ransomware Resiliency Report also shows that ransomware bypass techniques to hide their presence from security tools that test file
incidents resulted in damages of between $1 million and $5 million for 35 behavior in virtual environments,” she said. “It can be assumed that such
percent of the organizations whose IT pros they surveyed. functions will increasingly appear in ransomware code.”
In 2021, researchers expect to see a continued wave of attacks from both Along with the ability to better fly under the radar, ransomware groups are
malware operators themselves and from ransomware-as-a-service (RaaS) also looking to cast a wider net in terms of available targets, according to
purveyors, who provide access to ransomware toolsets in return for a Christo Butcher, global lead for threat intelligence at Fox-IT, part of NCC
percentage of the victim’s ransom. And as ransomware continues to spike, Group. Thus, they’re starting to take a multiplatform approach, branching out
there are a few emerging trends to keep an eye on. These include code tweaks; from exclusively abusing Windows code.
new adventures in extortion; changes in victimology; and the move to attack
cloud resources like Kubernetes and Docker. “Just like nation-state actors make their backdoors cross-platform, we expect
this adaption to be applied by ransomware gangs,” he said. “Currently most
ransomware groups are targeting Windows operating systems, but more and
“There is an unprecedented number of ransomware variants more companies are also running Unix. For example, the RaaS group Darkside
and actors popping up on a weekly basis.” has already adapted their ransomware operations to be more cross-platform-
capable, and many more RaaS providers are adding Linux payloads to their
service.”
“Ransomware operations were the predominant attack vector in 2020, with an
unprecedented number of different variants and actors popping up on a weekly Om Moolchandani, co-founder, CTO and CISO at Accurics, said that in the same
basis,” said Stefano De Blasi, threat researcher at Digital Shadows. spirit of expanding attack services, nonstop scanning for vulnerable targets
in the cloud and worm-like self-propagation have been added to a handful of
Ransomware Code Changes ransomware samples.
First and foremost, organizations can expect ransomware gangs to add a few “While desktops are relatively static, cloud use (especially infrastructure-as-
technical tricks to their arsenals, including those aimed at better detection a-service and platform-as-a-service) is much more dynamic in nature, and
evasion, as Yana Yurakova, analyst at PT, explained. malicious actors are always looking for new weak links,” he explained.
Also, compromise automation will continue, he said: “That scan doesn’t just
report findings, but additional systems take vulnerability findings as they’re
discovered and compromise the systems, then inform their owner of success.”
“My expectation is that groups will extend their offensive capacity by using
their considerable extortion earnings to buy or develop their own zero-day
exploits to gain initial access to their victims’ networks,” he said. “This will
ensure that they are able to continue compromising organizations even as
perimeter and phishing defenses improve.”
In late 2019 and 2020, the Maze ransomware group blazed new territory
when it began exfiltrating data and threatening to release it to get victims
to pay up. For instance, in May 2020, a U.S. military contractor involved in individuals, customers or partners in the company if they are able to discover
the maintenance of the country’s Minuteman III nuclear arsenal (Westech compromising information from their documents or communications.
International) was hit by the Maze ransomware, with the hackers making off
with reams of sensitive information, including employee data and company An example of this is an attack on cloud-computing company Blackbaud in July
emails, which may or may not have included classified military information. 2020. Ransomware attackers stole data on 200+ of the company’s customers
and used it to mount follow-on attacks.
“The primary change was that ransomware gangs realized that the network
admin access they often acquired would allow them to do nearly anything
to the victim, and was not just limited to encrypting files, data and operating Big Growth for Double Extortion
systems,” said Roger Grimes, data driven defense evangelist at KnowBe4. “This
includes exfiltrating confidential and critical data, and promising to release it
to hackers, competitors or the public, if the ransom is not paid.”
over over
This double-extortion tactic was soon adopted by most of the larger gangs, 50 percent 80 percent
who have also improved upon the model over time. That includes stealing
all found business, employee and customer login credentials; threatening
to publicly out victim companies; and the creation of customized “name and
shame” websites to advertise the compromise and demands, and to leak data. 2020 2021
Percentage of attacks where adversaries threaten to leak stolen information.
“By the end of last year, over 50 percent of all ransomware deployed similar Source: KnowBe4
tactics, and we expect that number to rise to over 80 percent this year,”
Grimes said. “This also explains why the amount of average ransom paid has “Ransomware operators, in addition to stealing data, can blackmail the
significantly increased over the last two years (from tens of thousands to over victim so that the data obtained during the attack will be used against their
$200,000) and why more victims are paying than in the past.” customers or partners,” PT’s Yurakova noted. “An outstanding example of a
supply-chain attack is the incident with the cloud software provider Blackbaud
An emerging extortion tactic for this year includes attackers becoming in May, during which not only the company itself but also its customers
increasingly sophisticated in post-exploitation activities, targeting suffered.”
Notably, Northwestern Memorial Healthcare reported a Blackbaud-related smaller companies,” Butcher said. “As for all the cases and investigations we’ve
breach impacting 55,983 individuals; and Inova Health System reported one done, we haven’t seen other groups applying this technique.”
impacting more than 1 million individuals.
However, an alleged representative from the REvil ransomware group
Cerberus’ Clements meanwhile noted that extortion could go even further in mentioned in a 2020 interview with Russian OSINT that he admired the idea.
the havoc it can cause. “I can foresee them targeting intellectual property or
trade secrets to resell to adversarial nation-states,” he said, “or orchestrating “Everything ultimately comes down to a shift toward leaking files and not
operations to manipulate stock prices by staging misinformation campaigns locking them,” he said. “I personally really liked SunCrypt’s idea. DoS [denial
that appear to come from official sources inside their victims’ organizations.” of service] the site of the company and their infrastructure, combined with
locking the files and threatening to publish them…[it] puts a lot of pressure on
On the heels of these new tactics, researchers warn that soon ransomware them…[We’re] thinking about employing a similar model.”
groups may be demanding double payment: One to decrypt the data and
another not to publish it. New Frontiers in Victimology
“For example, an affiliate of LockBit mentioned that the victim also had to pay In 2020, ransomware gangs also shifted to more targeted attacks and
for the data not being published or sold elsewhere,” Fox-IT’s Butcher said. larger organizations, including certain verticals known for lax security, like
“And the Clop ransomware group already has an option to pay to remove the healthcare. But there are new trends percolating in terms of victimology.
data from their leaking page. We wouldn’t be surprised to see a shift to double
payments by more ransomware operators.” For one, criminals will continue searching for known vulnerabilities in the
perimeter this year, particularly when it comes to lucrative industries that
There’s also the looming tactic of piling on distributed denial-of-service have existing security weaknesses, or that can’t afford a potential downtime in
(DDoS) attacks if a victim doesn’t pay. So, even if they clean the ransomware operations.
from the systems, companies will still find themselves with operational
disruption. “Penetration tests in financial organizations show a low level of protection: In
seven out of eight companies, an external attacker would be able to penetrate
“DDoS-after-encryption is something that might be an upcoming trend, however local networks from the internet,” said PT’s Yurakova. “So, bank ransomware
currently this is only observed being used by the SunCrypt group against some attacks will also likely increase this year.”
Criminals will also likely ramp up the targeting of industrial companies, she “One the most innovative attacks we will see this year will be cloud-native
added, which can be especially destructive. For instance, WestRock – the watering-hole attacks, due to rapid adoption of cloud-native technologies
second-largest packaging company in the U.S. – suffered an attack in January which are eccentrically immutable and ephemeral in nature,” Accurics’
that affected its operational technology (OT) systems used to manage, monitor Moolchandani said. “The continuous deployment of cloud-native technologies
and control industrial operations. It took weeks to restore its more than 320 like containers requires supply-chain infrastructure such as container-trusted
manufacturing facilities globally, which create packaging supplies for a bevy of registries like from Amazon, Docker and Google, etc. in order to deliver the
high-profile clients, including General Motors, Heinz and Home Depot. cloud-native artifacts such as a container images.”
This kind of operational damage increases the stakes – and the ransoms. Thus, a plausible attack vector involves an attacker corrupting a container
“In some cases, they already reach tens of millions of dollars, and the more image located in a container-trusted registry, which becomes a supply-chain-
companies fall victim to attacks, the more motivated hackers become,” based way to infiltrate a victim’s entire Kubernetes cluster.
Yurakiva said.
Niamh Muldoon, senior director of trust and security at OneLogin, noted “Gangs soon may be demanding double payment: One to
that taking the global economic environment and current market conditions decrypt the data and another not to publish it.”
into consideration, cybercriminals will also look to maximize their revenue-
generating streams by moving upmarket.
“Container images store application code and the dependencies needed to run
“During 2021 we are likely to see cybercriminals, both individuals and groups, the application,” explained Michael Vieth, senior application security consultant
partner together to try maximize their return of investment with their at nVisium. “Container images are typically stored within a centralized
attacks,” she said. “This could be targeting high-value individuals and/or large container repository, such as the Docker Hub. Container orchestrators such
enterprise organizations, for example.” as Kubernetes pull container images from repositories like the Docker Hub.
Thus, if an attacker is able to successfully compromise popular base images
Cloudy with a (Good) Chance of Ransomware (such as Ubuntu or WordPress) it could allow an attacker to plant ransomware
within seemingly legitimate images.”
As companies continue to turn to the cloud to support their work-from-home
strategies and digital transformations, ransomware operators too have cultivated The threat is more than theoretical: Docker Hub reported in 2019 that 190,000
interest in cloud-native resources – a trend that’s likely to develop further this year. accounts had been breached. These credentials could have allowed attackers
to modify any Docker images that the account had privileges to manage, Whether it’s code changes, new extortion techniques, an expansion of
allowing them to push a new update to an existing Docker image containing victimology or a pivot to the cloud, ransomware operators are continuing to
ransomware. Then, when other users pull the new image and run it on their forward themselves and improve their ability to flourish in an ever-shifting
hosts, they import the ransomware to their environments. landscape – a state of affairs that defenders would be wise to keep in mind.
“The thought of a ransomed Kubernetes cluster is not a pleasant one,” “Cybercrime is a business so we all should think of it the same way,”
Moolchandani said. “These systems are growing more complex; It is an OneLogin’s Muldoon said. “Out of all the various types of cybercrime,
imperative that their security and configuration management is properly ransomware is the one activity that has a high direct return on investment
managed, or the results could be catastrophic. The interest follows any associated with it.”
valuable, insecure resources, so it’s just a matter of time until this becomes
more popular.”
A Peek Inside
the Ransomware Economy
By Tara Seals
At the center of the scene is the fact that ransomware operators often adopt
affiliates, to whom they provide ransomware-as-a-service (RaaS) offerings.
Affiliates can be seen as the channel partners of the underground, responsible
for ransomware distribution to end victims. They usually pocket between
60 and 80 percent of the ransom, with the rest going into the operators and
authors’ coffers.
“These gangs run like legitimate businesses: They have customer service
and IT support, and will do what they can to boost their brand reputation,”
according to experts at Intel 471, in a collaborative interview. “So, your most
popular variants are those that result in higher payouts and take care of the
criminal’s asks once they are brought into an affiliate program.”
Affiliates usually outline these skills in a “resume,” and are often asked to
perform actual successful network attacks and ransomware deployments
during a short trial period, researchers said. And, all potential candidates are Not all gangs are considered equal in the underground. Competition for
required to pass an interview with the affiliate program’s support staff. affiliates comes down to the commission and how quickly it’s paid, the speed
and quality of encryption, and the extortion mechanisms that the ransomware
This pickiness has to do with maximizing revenue. Successful attackers group offers to “motivate” the victim to pay (for instance, exfiltrating and
perform weeks of reconnaissance in order to accumulate information on the holding data hostage).
target’s finances and business situation, to set an appropriate ransom price –
and they need the right skill set in order to do that. “Each group has a different scheme,” explained Dmitry Bestuzhev, head of
research center for Latin America at Kaspersky. “A ‘good’ one offers about
“They’re in enterprise systems for weeks or months, gathering as much 80 percent as commission to those who work with them. Some implement
data as possible to make sure their attack is successful,” according to automated payments, where funds once received from the victims are
Intel 471. “The more attackers understand a business by combing through automatically split and sent to the affiliated group. That is the most attractive
communications, ledger sheets, along with services and product offerings, the mechanism for those who work with ransomware. In addition, there is a transit
better they know how to tailor their ransomware demands to a price that will cryptocurrency in the middle, like Monero, which brings more anonymity
grab attention, but won’t be so large that it gets ignored.” compared to Bitcoin.”
Meanwhile, in order to prevent infiltration of affiliate programs by western Ransomware Ecosystem Services
law-enforcement services and by cyber-threat researchers, some RaaS
gangs implement additional precautions, which include vouching by existing As gangs continue to pivot to high-value victims, network-access merchants
members, a requirement for a native command of the Russian language, or have become an important part of the scene, researchers said. Criminals in
vetting of local and cultural knowledge pertaining to Russia and ex-USSR underground forums will advertise access to various breached organizations,
countries, the researchers added. and quickly turn to sell access to the highest bidder or strike a deal with a
ransomware affiliate in order to share any profits pulled from a successful
For example, a posting in the Exploit cybercrime forum by the REvil payment.
ransomware gang in fall 2020 noted, “No doubt, in the FBI and other special
services, there are people who speak Russian perfectly but their level is They offer information-stealing malware, logs of vulnerable (unpatched)
certainly not the one native speakers have. Check these people by asking them companies, or credentials stolen and offered by individual vendors, for
questions about the history of Ukraine, Belarus, Kazakhstan or Russia, which example.
cannot be googled. Authentic proverbs, expressions, etc.”
“These partnerships have resulted in a flourishing submarket, where access If the total ransom is $10 million, he said, then each “job” brings the gang
to corporate networks is sold for six-figure sums directly or via a partnership about $4.9 million. This is what’s left after the costs for piggybacking on botnet
and cut of paid ransoms,” according to Intel 471. infections or buying access to victim networks (around $100,000); giving the
ransomware developers their cut, which can be up to 40 percent; and Bitcoin
Also, since the ransom price is unique and calculated for each victim laundering, which takes around 10 percent in fees.
individually, ransomware gangs count on financial analysts.
Bestuzhev estimated that an active group probably makes hundreds of
“When the data is stolen, they work with it to understand the nature of the millions of dollars per year.
business, its profit and other data,” Bestuzhev said. “They do it to measure what
is the highest price they can ask for but still to stay below the recovery cost, What Affiliates Make
which sometimes includes fines for violations of HIPAA and other regulations.”
Affiliate profit (�4.9M)
Follow the Money Ransomware
authors' cut (�4M)
Total ransom
The vast majority of ransom payments are made in cryptocurrencies, most �10 million Bitcoin laundering/money
often in Bitcoin. mule services (�1M)
But Bryan Oliver, cybersecurity analyst at Flashpoint, said there’s currently REvil famously claimed that a private party bought data related to Donald
little evidence that this is part of the economic reality of the ransomware Trump after it stole data from celebrity law firm Grubman Shire Meiselas &
scene. Sacks: “Interested people contacted us and agreed to buy all the data about
the U.S. president, which we have accumulated over the entire time of our
“Conti and Egregor have locked an extremely high number of victims, and have activity. We are pleased with the deal and keep our word,” the leader said, in
been struggling to shame victims on their extortionist sites as fast as they the aforementioned OSINT interview.
attack new victims,” he said. “As of January 11, 2021, we have not observed
either of these groups actually selling data, and assess that there is a good However, no evidence was provided for the claim.
chance they are not actually selling data, but instead, are just claiming that
they are in order to pressure victims whose data they do not have time to “Auction claims should be viewed with a healthy amount of skepticism,” Oliver
upload.” said. “Essentially, whether any ransomware groups have successfully sold
data online or not, this does not appear to be a tactic commonly employed to
One of the only known examples iis the ransomware gang behind the hack of successfully increase profits.”
CD Projekt Red making good on its promise to auction off the company’s data.
Source code for Cyberpunk 2077 and an unreleased version of the Witcher 3
was put up for sale in February 2021 on the well-known Russian-language
underground forum “Exploit,” and was sold a day later.
At least one other group, REvil, has been observed supposedly auctioning off
the data of breached companies on its blog.
Threatpost Poll:
The Cost of a Ransomware Attack
By Threatpost Staff
Ransomware is on the rise, but what toll does it take on the real world?
Threatpost set out to answer that question in an exclusive poll aimed at
taking the pulse of organizations wrestling with attacks, including looking at
mitigations and the defenses organizations have in place.
The number of ransomware attacks has jumped by 350 percent since 2018, and
the average ransom payment increased by more than 100 percent just since
2020, according to a recent report from PurpleSec. Meanwhile, downtime is up
by 200 percent and the average cost per incident is on the rise.
Groups with names such as Ragnar Locker, Ryuk, Egregor, Conti and many
others are ruthless, well-funded and willing to target anyone to get their
payday; from COVID-19 vaccine manufacturers to retailers, banks to local
governments, schools, hospitals and more.
Rising ransoms have also helped evolve ransomware attackers from what
were historically basic scammers into a professionalized group of criminal
organizations with deep benches of top cybersecurity talent.
Among all 120 respondents, a little less than a third said they have been a the consensus is that paying the ransom is a bad idea. A full 78 percent argued
victim of ransomware. In terms of victims, the leading sectors hit the hardest against giving into extortion demands, for a range of reasons.
were tech and manufacturing (17 percent and 15 percent of respondents).
The next-most-common profiles were evenly distributed among finance, If your company did NOT pay the ransom ― and recovered
healthcare and critical infrastructure. relatively unscathed ― to what do you credit the limited impact?
No (44%)
Yes (22%)
Other (7%)
Backing up data Other (10%)
religiously (43%)
Cybersecurity insurance (5%)
Network segmentation (20%)
Ransomware mediation
Privileged access services (5%)
management (17%)
These self-identified victims of ransomware attacks told their attackers to
take a hike. A full 80 percent said that they didn’t pay the ransom.
The top reason cited, by 42 percent, is that cybercriminals aren’t trustworthy
The poll results revealed sometimes counterintuitive attitudes towards (go figure) and that paying the ransom doesn’t guarantee a decryption key.
ransomware and how to deal with it. Included in these charts are Threatpost’s Respondents also felt that having backups is a better approach to dealing with
top findings. an attack (cited by 34 percent) – though of course that requires foresight.
To Pay or Not to Pay Sixteen percent did note that situations vary, and can be complicated,
depending on the impact on business continuity and the nature of the data
Among all respondents to Threatpost’s poll (both victims and the lucky ones), placed at risk. For instance, healthcare organizations and manufacturers may
face potential safety risks if their data is encrypted and devices bricked. In this about half of victims who did pay the ransom after an attack also paid less
case, they may choose to pick the quickest – not best – option for getting their than $50,000 in remediation – not counting the ransom payment.
data back.
What ransomware defenses
Should state or federal laws govern how businesses do you have in place?
respond to ransomware attacks?
Yes (51%)
No (49%)
while another 2 percent said that cybersecurity insurance will cover any Monthly backups
Network and resource of critical data (9%)
ransom and related costs. segmentation (14%)
Other (2%)
Interestingly, just 1 percent said that paying will ultimately cost less in the long
run. Threatpost’s poll results showed that costs – ranging from operational
or system downtime, negative brand backlash or otherwise – are often still Ransoms seem to vary however – in keeping with researchers noticing that
realized by the victims even when they do pay. gangs tailor demands to companies’ profiles. Thirteen percent of ransomware
victims who did not pay a ransom said they still paid between $50,000 and
Threatpost found that more than half of victims (57 percent) suffered less than $100,000 – and 13 percent paid more than $1 million.
$50,000 in remediation costs if they did not pay the ransom. Comparatively,
And, about 12.5 percent of those who did pay the ransom also paid more than
$1 million in overall remediation. In fact, 6 percent of this category of victims
paid more than $100,000.
But implementing those defenses is easier said than done. Poll respondents
cited a range of challenges when it comes to fending off ransomware attacks.
No: paying the ransom does not Yes: it΄s better then dealing
guarantee a decrytion key and with business disruption,
futher encourages attackers (41%) lost data and remediation (6%)
No: we have back-ups and are Yes: paying will ultimately cost
prepared for an attack (33%) less in the long run (2%)
Cyber-Insurance Fuels
Ransomware Payment Surge
By Lindsey Welch
In the first half of 2020, ransomware attacks accounted for 41 percent of the
total number of filed cyber-insurance claims, according to a Cyber Claims
Insurance Report released last year by Coalition.
And indeed, in real-world attacks over the past two years, many companies
afflicted by ransomware acknowledged that they had utilized cyber-insurance
to deal with either the ransom itself or the ensuing cost of remediation.
For instance, weeks after Riviera Beach, Fla. was hit by ransomware in June
2019, the city council held an emergency meeting. It voted unanimously to
authorize the city’s insurer to pay off a $600,000 ransom demand, after the
malware had frozen crucial data. Adversaries also took systems that control
city finances and utilities offline.
That same month, Lake City, Fla. paid ransomware attackers almost $500,000,
which the city announced would be mostly covered by insurance.
Regulatory Moves Hamper Cyber-Insurance’s Role The Department in October 2020 expanded the sanctions’ applicability,
saying that in general, companies that facilitate ransomware payments to
Cyber-insurance companies often tout their ability to mediate payments cyber-actors on behalf of clients (so-called “ransom negotiators”) may face
between a ransomware victim and cybercriminals. But governments are sanctions for encouraging crime and future ransomware payment demands.
looking at potential regulatory action when it comes to ransomware –
including a ban proposed by New York in 2020, preventing municipalities from Nation-State Exclusions
giving in to ransomware demands.
Cyber-insurers for their part have also added in their own loopholes when it
This ban, introduced in response to the rising tide of cyberattacks targeting comes to certain nation-state attacks.
government agencies across the country, would limit municipal entities’ ability
to pay a ransom if hit by an attack. It instead suggested the creation of a In 2017, when the NotPetya malware infected hundreds of organizations across
“Cyber Security Enhancement Fund” aimed at helping municipalities to upgrade the world, some insurers invoked their war exclusions to avoid paying out
their security postures. A similar bill, proposed in the New York State Senate NotPetya-related claims. These types of war exclusions deny coverage for
in 2020, would also ban municipalities from paying ransoms – but Senate Bill “hostile or warlike action in time of peace and war.” However, this caused
S7289 would omit the creation of a security fund. some to criticize the ambiguity of how this clause could be applied.
Breaking Down Cyber-Insurance Costs How can cyber-insurance policies be improved to address these concerns?
Netenrich’s Hoffman argued that insurance companies should refuse to
�1,485 �650 to �2,357 �1 million �10,000
The average cost The premium range for The liability limits that The deductible for
pay premiums – let alone ransoms – unless basic prevention and recovery
of cyber-insurance per year cyber-insurance for companies these premiums are these premium measures are performed by the insured organization on an ongoing basis.
in the United States with “moderate risks” based on ranges
Source: AdvisorSmith Solutions Inc. “I know this sounds harsh, but there’s a reason why governments and law
enforcement do not negotiate with terrorists in hostage situations, and
Meanwhile, the U.S. Department of the Treasury has added multiple crimeware ransomware should be treated the same way,” said Hoffman. “Building a
gangs to its sanctions program, prohibiting U.S. entities or citizens from doing resilience plan and a recovery plan for ransomware is the proper path, and
business with them (including paying a ransom). These include the developer of creating awareness of the likelihood that this can happen to your organization
CryptoLocker (Evgeniy Mikhailovich Bogachev); the SamSam ransomware group; will pay off in a big way.”
North Korea-linked Lazarus Group; and Evil Corp and its leader, Maksim Yakubets.
It was the fall of 2019, and this East Coast public school district was busy prepping for the academic year ahead. The end-of-summer bustle was typical, with
municipal IT staff deploying system updates and bringing new infrastructure online. The team was oblivious to the mad scramble about to come.
The first sign of trouble surfaced when a sysadmin noticed a mysterious flurry of outbound network requests to an unknown IP address. Then, the anomaly became
a beehive of mysterious network activity spreading across dozens of local endpoints. It was a clear sign of attack.
Hour One Priority No. 1 within the second hour of identifying the active attack was
48 understanding what the culprit was (as in, which malware), and the nature
“The infection was immediate and disruptive,” recalled Mark Ostrowski, of the assault. Ostrowski drew direct comparisons to the initial response to
cybersecurity evangelist with Check Point’s office of the CTO, who was part COVID-19, and the IT team’s own scramble to identify the infection, its origin
of a third-party security response team called in to help mitigate the attack. and what variant front-line workers were dealing with.
The vulnerable infrastructure was not massive, but vital to the town’s Some of this was quickly discovered, as ransomware notes popped up
school system and hundreds of thousands of district parents and students. on unattended computer screens at one campus. But this first victory in
On the line was infrastructure that spanned three campuses, separated by staunching the attack – identifying the final payload – didn’t feel like a win,
just over 10 miles each. Network specifics included nearly 1,000 nodes – said Ostrowski.
both virtual and physical – along with hundreds of physical endpoints – desktops,
laptops, servers and handhelds. Hour Four
Hour Two After analyzing samples of malware found on infected machines, security
responders identified one of the pieces of the attack. It was a 2019 variant
Texts and email alerts were sent to the dozen-plus members of the municipal of the TrickBot trojan, which is often seen stealing credentials and working
IT team responsible for managing the network. It was an “all-hands-on-deck” with other malware, including ransomware. In this case, TrickBot was the
plea for help to address the rapidly unfolding cyber-incident. malicious code that the attackers used to mount and spread the initial
infection. Instead of lying dormant and siphoning financial data, TrickBot was Hour Seven
being leveraged by attackers to further infiltrate the network to then deploy
the ransomware payload. The goal was to protect vulnerable network resources and endpoints,
find the source of the infection and neutralize the malware. However,
“Clearly we were seeing in real time the evolution of this malware from a this seemed out of reach. With visibility limited to only one piece of the
banking trojan to a multifunctional tool,” Ostrowski said. overall attack puzzle (TrickBot), the decision was made to call for back-up
assistance from a third party. Still unknown was the source of the infection,
Over the next few hours, any playbook on how to mitigate TrickBot went and the totality of which resources were compromised.
out the window. This variant gained the upper hand over the security team
and began moving laterally across the network. The concern escalated Not Quite a Jack-Bauer Moment: Hour 24
to panic, as TrickBot showed signs it could easily jump the 10-mile span
to neighboring campuses via the hair-thin fiber-optic data pipes that By the time reinforcements arrived on-premise, TrickBot’s tentacles had
connected them. reached all three campuses and had begun to move laterally within the
virtual infrastructure of the school.
Hour Six
“There were about 20 of us, including local staff. The name of the game
By hour six, the security team had identified a clear line of communications was to turn off as many physical endpoints and virtual nodes as quickly
between the TrickBot malware and an amorphous distributed botnet as possible,” Ostrowski said. That required boots on the ground, physical
directing the attack. The pace of the lateral spread quickened, with TrickBot access to interior offices and classrooms, and broad network permissions
rapidly worming its way from endpoint to endpoint. Meanwhile, the head of and access.
IT for the school district came to a dreaded realization as he stared into his
laptop monitor in dismay. He watched his network dashboard light up, with “We couldn’t pull the plug on everything. Authentication servers and
the infections spreading like lightning across the school district’s network. mission-critical resources needed to stay online,” he explained.
its underlying code signature was continually changing and adapting to “We were putting out brush fires left and right. Meanwhile [we] still had no
avoid detection. visibility into the blaze,” Ostrowski recalled.
As the impromptu team scrambled across campuses and hurried through Hour 40
halls, the diagnosis wasn’t good. Within what was passing for the network
operation center (NOC) – a fluorescent-lit conference room with a long Then, as hundreds of thousands of command-and-control requests were
Formica table – it was clear that endpoints had been woefully under- being made for the ever-changing TrickBot samples, a turning point
protected. Virus definitions were out of date, and patches not evenly applied occurred.
throughout the school district.
Finally, in a moment that ironically had little fanfare for the team, the
Hour 36 original point of infection was identified.
The team would soon split into task-specific groups. One would continue The source, or malware entry point, was an on-premise insecure remote
to identify and clean virtual and physical endpoints and nodes, and shut desktop protocol (RDP) server. It was the leaky spigot that needed to be
them down to protect them from infection. Another team was tasked with turned off in order for the cybersecurity team to get their arms around the
identifying mission-critical network resources before they became infected, emergency.
and inoculating them with antivirus protection and patch updates.
Hour 41
There was also a third (and by far the most important) team, which
methodically examined a firehose of network data generated by TrickBot’s “Once you identify the source of the infection you can start to contain it,”
blaze of infections. This team’s focus was on the forensic analysis of the Ostrowski explained. Borrowing from his COVID-19 analogy, “This is when
attack, versus incident response. you can start rolling out the vaccine and healing the sick.”
Meanwhile, desktops, laptops, virtual servers and network nodes were Security teams now shifted to assessing the damage, and working on virus
being “bricked” by the dozens each minute by ransomware. Each endpoint removal, data recovery and rebuilding infected systems taken offline.
displayed the same demand for Bitcoin in exchange for encryption keys.
Hour 42 In this case though, patching and having updated antivirus would have
protected the school district from being an easy target.
Municipal and third-party teams were working in tandem. With the fire drill
mostly over and the computer forensics already performed on the TrickBot
variant’s path of destruction, this allowed for better network fumigation. The
once-bustling team of perspiring IT workers was able to calmly shift from
incident-response mode to damage assessment and repair.
Hour 46
“At this point we had containment,” Ostrowski said. “We blocked the
adversary from causing further damage.”
Hour 48
Ostrowski said he isn’t aware whether the municipality paid the ransom (or
how much the demand was for). He noted that the school system dodged a
bullet in that critical databases were not impacted.
Gloomy ransomware forecasts for 2021 translate into cybersecurity pros Proactive Patching: Enable automatic patching for all operating
needing to keep on their toes. Here is a preventative round-robin of best systems and internet browsers. Ensure that anti-virus signatures
ransomware practices to steer you clear of lost data, extortion and attacks. are up-to-date and take inventory of all network nodes – virtual
and hardware.
Disable PowerShell: Disable PowerShell on workstations where Security Awareness Training: Employees need to be trained to spot
possible. If it cannot be disabled, then be vigilant about logging common threats and to be suspicious of suspect links or documents
and monitoring PowerShell activity. sent via email, collaboration apps, social media and more. Watch for
shadow IT and rescind accounts for departed workers.
Conclusion Acknowledgments
Data security, business continuity, the supply-chain and perimeter defenses Threatpost is a long-running, independent source of news and analysis about the
are a sampling of what is at risk with ransomware. The sobering reality is cybersecurity landscape, covering breaking news and threat research, malware
that businesses need to view ransomware as a future event to plan for, not a and vulnerability analysis, long-term trends and everything in-between.
hypothetical abstract.
Modern businesses, even those firmly planted in the brick-and-mortar trade, Editorial Contacts Advertising and Sponsorships
are not immune to the impact of a ransomware attack. Cloud services, remote
workers and a reliance on connected devices (even surprising things, like Tom Spring Oliver Gillis
HVAC systems) put any business at risk for a ransomware incident. Editor in Chief Business Development Manager
[email protected] [email protected]
Awareness means paying attention to the latest ransomware attacks and +1-339-240-8788
gathering as much knowledge as possible when it comes to what the threat Tara Seals
actually looks like. The polymorphic nature of ransomware crimes plays out in Senior Editor Threatpost
multiple dimensions, and paying attention to those developing trends is vital. [email protected] www.threatpost.com
Woburn, Mass.
The avalanche of ransomware stats, facts and forecasts can seem defeating. But Lindsey Welch
a deer-in-the-headlights approach to dealing with the issue will be catastrophic. Senior Editor
The threat is existential, and one that isn’t going away anytime soon. [email protected] Copyright 2021 Threatpost