Thursday, 13 May 2021 07:14

Ransomware functions as a well-organised ecosystem: Kaspersky claim Featured

0
Shares
By
Image by Joseph Mucira from Pixabay

The process of staging a ransomware attack is much more complex than portrayed, with a number of actors involved, the global security company Kaspersky claims in a detailed blog post about how a typical attack chain is organised. The post was written on Anti-Ransomware Day aiming to demolish some myths around ransomware, which predominantly attacks systems running Microsoft Windows.

The first myth was that there was some "gang" responsible. This was incorrect, as the initial access, researchers Dmitry Galov, Leonid Bezvershenko and Ivan Kwiatkowski wrote, was provided by botmasters — those who managed established botnets — and account resellers. Once this was done, a group called the red team by Kaspersky — after the offensive units in security companies — established full control over the victim network and geared up for the actual encryption of files by deploying the ransomware.

While this was going on, information was collected on the victim and internal documents were purloined; these were then sometimes sent to another team, the analysts, who assessed what could be demanded as a ransom, with the task being to determine the optimal amount to be asked for in order to put maximum pressure on the victim.

After this was completed, the red team bought a ransomware product from developers, with the deal usually being a cut of the ransom.

"An optional role here is the packer developer, who may add protection layers to the ransomware program and make it harder for security products to detect for the few hours it needs to encrypt the whole network," Galov, Bezvershenko and Kwiatkowski wrote.

"Finally, negotiations with the victims may be handled by yet another team and, when the ransom is paid out, a whole new set of skills is needed to launder the cryptocurrency obtained."

The overall point they made was that ransomware operations should be viewed as an ecosystem. "[It should be] treated as such: it is a problem that can only be addressed systematically, for instance by preventing the money from circulating inside it – which involves not paying ransoms in the first place," the trio emphasised.

A second myth that the three Kaspersky researchers claimed had been perpetuated was that targeted ransomware was indeed targeted. "As far as we know, these groups do not peruse the Financial Times to decide who they are going after next," they wrote.

"Counter-intuitively, the people who obtain the initial access to the victim’s network are not the ones who deploy the ransomware later on; and it is helpful to think of access collection as an entirely separate business.

"For it to be viable, sellers need a steady stream of 'product'. It might not make financial sense to spend weeks trying to breach a predetermined hard target like a Fortune 500 company because there’s no guarantee of success. Instead, access sellers go after the low-hanging fruit."

The sources for access were mainly botnet owners and access sellers, the latter being underground operatives who were on the lookout for publicly disclosed vulnerabilities in Internet-facing software like VPNs or email gateways. As soon as these were known, as many networks as possible were penetrated. Thus, the three wrote, the identity of the victim often became known to the attackers only after the attack.

Another point that Galov, Bezvershenko and Kwiatkowski sought to make was that while those deploying ransomware to make money were technically criminals, all those involved in the ecosystem did not come from the cyber crime underworld.

"In the past, high-profile ransomware attacks have been used as a destructive means," they pointed out. "It is not unreasonable to think that some APT [advanced persistent threat or nation-state] actors are still resorting to similar tactics to destabilise rival economies while maintaining strong plausible deniability."

The post also included details about how ransomware was marketed; one salient point made was that the whole ecosystem was a closed one, with operators being very careful about whom they worked with. Often, there were geographical and language restrictions placed on people. There was a ban on malware being used in the jurisdiction where an involved individual was located.

Galov, Bezvershenko and Kwiatkowski also analysed two campaigns, one by REvil and another by Babuk, to illustrate how the process was managed. All this material has been public for a long time and was not dug up by the Kaspersky trio.

The researchers pointed out that though their latest statistics, issued on 23 April showed a drop in the number of users who had been affected by ransomware, it only meant that random individuals were unlikely to be surprised by an attack. On the other hand, companies faced as a high a risk as before, if not a higher one.

"There was a time where SMBs [small and medium-sized businesses] could mostly ignore the challenges posed by information security: they were small enough to stay under the radar of APT actors, but still big enough not to be affected by random and generic attacks," the Kaspersky trio said. "Those days are over, and all companies today are now in a position where they must be prepared to fend off criminal groups.

"Thankfully, such attackers will usually go after the low-hanging fruit first, and setting up appropriate security practices will make a world of difference."


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Latest from Sam Varghese

Related items

Share News tips for the iTWire Journalists? Your tip will be anonymous