Ransomware and Recent Variants

Discussion in 'malware problems & news' started by ronjor, Mar 31, 2016.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
    http://www.infosecurity-magazine.com/news/new-teslacrypt-variant-delivery/
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Ransomware Can Infect Android Devices Without Any User Interaction
    http://news.softpedia.com/news/rans...ces-without-any-user-interaction-503394.shtml
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    New Decryptor Unlocks CryptXXX Ransomware
    https://threatpost.com/new-decryptor-unlocks-cryptxxx-ransomware
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    A Chinese researcher has published a detailed analysis of the COM elements along with an improved technique for implementing the backdoor component here: http://en.wooyun.io/2016/04/23/Use_SCT_to_Bypass_Application_Whitelisting_Protection.html .

    The script execution on the local machine is only used to register the COM components. Thereafter it is COM that is running the scripts from the remote machine:

    1. In Extensible Markup Language (XML) files, a COM object ended with sct can be created through scripting languages (VBScript or JScript)

    scrobj.dll:

    2. It is used to send the COM request to Script Component.

    Execute the Regsvr32 command to register COM components:

    Execute this with administrator permission: regsvr32 /i:"Component.sct" scrobj.dll

    3. Use vbs to call the registered COM components

    TestVB.vbs:

    Dim ref
    Set ref = CreateObject("Component.InsideCOM")
    MsgBox ref.Sum(4, 6)

    4、Complementary

    As aforementioned, VBS can be used to call the recently registered COM component "Component.InsideCOM", which can also be implemented through Jscript.

    (1) the Jscript implementation
    ComponentJS.sct:(https://github.com/subTee/SCTPersistence/blob/master/ComponentJS.sct)

    TestJS.js

    var ref = new ActiveXObject("Component.InsideCOMJS");
    var x = ref.Sum(4,6);
    WScript.Echo(x);
     
  8. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    OK, from that I still don't know if disabled script hosts would break technique. It's nice to see that outbound firewall control could stop the attack.
     
  10. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I also believe that a true malware version employing this technique would be using a "disguised" version of regsvr32.exe. So use of a firewall that monitors all new outbound connections is essential.
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  13. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Decrypter for Alpha Ransomware Lets Victims Recover Files for Free
    http://news.softpedia.com/news/decr...s-victims-recover-files-for-free-503581.shtml
     
  14. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
    http://www.securityweek.com/compromised-rdp-servers-used-corporate-ransomware-attacks
     
  15. marzametal

    marzametal Registered Member

    Joined:
    Mar 19, 2014
    Posts:
    766
    Can Ransomware encrypt unallocated space (eg: RAW with no file structure)?

    One example would be...
    HDD - 100mb System Reserved - 1 gb RAW unallocated - C drive - 1 gb RAW unallocated - D drive

    What I am essentially asking is, does a file system structure need to be present before Ransomware can encrypt, or is it impartial and just sees a hard drive?
     
  16. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  17. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    On The Monetization Of Crypto-Ransomware
    https://labsblog.f-secure.com/2016/05/06/on-the-monetization-of-crypto-ransomware/
     
  18. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Criminals peddling affordable Alphalocker ransomware
    https://threatpost.com/criminals-peddling-affordable-alphalocker-ransomware
     
  19. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  20. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yep, today at work I got few of them (don't know if it was Alpha... or some other variant). Didn't get them for past few weeks so it looks like my spammers switched from usual spam mail to ransomware :)
     
  21. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  22. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
    http://www.securityweek.com/bucbi-ransomware-spreading-rdp-brute-force-attacks
     
  23. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    I hope that this is an appropriate thread to share this.

    Root Access Podcast - Episode 3 - Ransomware
    Link: https://rootaccesspodcast.com/#ep-3-ransomware

    Hosted by Josh Pyorre of OpenDNS / Cisco. It's been a pretty decent podcast thus far and they link to related material with each episode for further details.
     
  24. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,653
  25. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    CryptXXX Is Now Undecryptable, Prevents Users from Accessing Their PC
    http://news.softpedia.com/news/cryp...ts-users-from-accessing-their-pc-503884.shtml
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.