0% found this document useful (0 votes)
26 views22 pages

Ransomware White Paper

ransomware

Uploaded by

liongod79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views22 pages

Ransomware White Paper

ransomware

Uploaded by

liongod79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

White Paper

Targeted Ransomware
By Threat Hunter Team

Table of Contents
Introduction

Targeted Ransomware Trends

Attacker Profiles
Maze
Sodinokibi
BitPaymer
WastedLocker
Miner: Ryuk, GoGalocker, and
MegaCortex

Infection Vectors
Phishing
Malvertising
Vulnerability Exploitation
Secondary Infections
Poorly Secured Services

Credential Theft and Lateral


Movement
Introduction
Conclusion
Over the past 18 months, targeted ransomware has moved from being a
Protection lucrative, but niche area of cyber crime to probably the most dangerous
File-based Protection
threat facing enterprises. During this period, the number of groups
conducting these attacks has multiplied. Massive reported ransom payouts
AI-based Protection
have created a gold rush mentality among attackers, with some veteran
Threat Hunting
cyber criminals abandoning their traditional areas of operations and
Endpoint Detection and Response
pivoting to targeted ransomware.
(EDR)
The impact of this proliferation has been amplified by the advent of
Mitigation
ransomware-as-a-service (RaaS), where successful ransomware developers
Appendix 1: Dwell Time Analysis lease out their wares to other attackers in exchange for a percentage of any
ransom payments.
Appendix 2: MITRE ATT&CK®
Tactics too have evolved, and attackers have found more ways of extorting
Techniques
victim organizations. A growing number of attackers now steal data from
their targets before encrypting computers. The attackers then threaten
to publish this data unless the ransom is paid. The threat of a data breach
increases the pressure on victim organizations to pay. It also provides the
attackers with leverage over victims who may have been in a position to
restore encrypted systems from backups.
Targeted Ransomware
White Paper

The level of threat means that organizations of all sizes should inform themselves about how these attacks can
unfold, and take all possible steps to reduce the risk of a successful attack.

Targeted Ransomware Trends


The number of organizations affected by targeted ransomware attacks has grown steadily over the past year and a
half. Looking at the number of verified attacks by 10 prominent targeted ransomware groups, we found that while
the number of organizations attacked each month has fluctuated, the overall trend is upwards.

Figure 1: Number of Organizations Affected by Targeted Ransomware Attacks, January 2019 to July 2020

100

90

80

70

60

50

40

30

20

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

Symantec, a division of Broadcom (NASDAQ: AVGO), observed 31 organizations being attacked in January 2019.
This number rose to 89 during the month of July 2020.

The real number of targeted ransomware attacks may be higher. Some ransomware families, such as Dharma (also
known as Crysis) have been deployed through spam campaigns—in addition to being used in targeted attacks.
There is no way to establish how many victims were infected by these targeted attacks, and how many were
infected through other means.

In addition to these targeted attacks, confirmed attacks from the 10 aforementioned ransomware families are
probably only a representative sample of the overall number of attacks involving these threats. Most targeted
ransomware operators recompile their ransomware for every new attack. This means that the variant of the
ransomware used in an attack may be blocked by a generic or machine learning-generated detection signature,
rather than a detection linked to that ransomware family.
Targeted Ransomware
White Paper

Figure 2: Number of Organizations Affected by Targeted Ransomware Attacks, by Family, January 2019 to July 2020

WastedLocker Ryuk Maze BitPaymer


Sodinokibi Robbinhood Matrix
SamSam MegaCortex GoGalocker

100

90

80

70

60

50

40

30

20

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

When the attacks are broken down by ransomware family, it becomes apparent that the profusion of new actors is
driving the growth in attacks. In January 2019, three of the analyzed groups were active. By July 2020, eight groups
were carrying out attacks. During 2020, relatively recent arrivals on the scene such as Sodinokibi, Maze, and more
recently, WastedLocker, have significantly contributed to the overall increase in attacks.

Figure 3: Number of Targeted Ransomware Infections by Country, January 2019 to July 2020

3,000 2,916

2,500

2,000

1,500

1,000

500 368
282
155 145 112 111 108 99 98
0
SA

ey

ce

o
ne

di

ad

bi
al

ic
U

an
rk
U

It

ex
In

ra
i

an
pp
Tu

Fr
iA

M
C
ili

ud
Ph

Sa
Targeted Ransomware
White Paper

When analyzing attacks by geographical region, a different methodology needs to be employed since many victims
of targeted ransomware have operations in more than one country. By counting identifiable infections from the
10 targeted ransomware families listed above, the U.S. continues to be the country that is by far the most heavily
targeted by attack groups. Curiously, it is followed by Turkey and the Philippines. These countries usually do not
figure so prominently in cyber crime statistics. The remainder of the top 10 countries is less of a surprise.

Attacker Profiles

Maze
Maze first appeared in May 2019, and in the intervening period has been one of the most active targeted
ransomware groups. The group is best known for pioneering the tactic of exfiltrating data from victim organizations
prior to encryption and threatening to release this data unless the ransom is paid. This increases the pressure on
the victim to pay the ransom and provides a new pressure point that can be applied against victims capable of
restoring affected systems from back-ups. This tactic was quickly copied by a range of other targeted ransomware
groups including Sodinokibi, Nemty, and DoppelPaymer.

Figure 4: Organizations Affected by Maze Attacks, January 2020 to July 2020

20

18

16

14

12

10

0
Jan Feb Mar Apr May Jun Jul
2020
Targeted Ransomware
White Paper
Maze
Figure 5: Maze Attack Flow

Spelevo Flash Malicious


Exploit Kit Vulnerability CLI
Java File

Likely Infection
Vector XenArmour Admin
Suite Creds

Adds .random Characters


Elevated Extension
Phishing
Email Privilages

Ransom Note
WMI Maze Ransom Payload
(DECRYPT-FILES.txt)

Security Victim
Identifies Devices Systems
Present

Shadow
Deletes
Copy

File / Network
Scanner

The main distribution channels for Maze are the Fallout and Spelevo exploit kits—with victims being directed to
them through spam email campaigns. Once the attackers gain access to a single computer on a network, they
download the commodity malware Cobalt Strike and the Metasploit Framework to move laterally across the
network and enumerate machines.

The attackers scan for machines on the network running the RDP protocol and use brute-force attacks to obtain
credentials and gain privileged access to servers. This access allows the attackers to identify file servers and
databases, allowing them to exfiltrate data that will subsequently be used to extort the victim.

The group tends to spend a long time on the victim’s network. Up to 21 days can pass between the initial intrusion
and the ransomware execution.

A noteworthy feature of the Maze attacks is that the attackers check the language used on the victim’s system.
If the language is set to Russian, the malware does not execute.
1 | Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Maze also has an unusual approach to payment, demanding two separate payments from the victim. The first
payment is in exchange for an undertaking not to share data stolen from the victim. The second payment is to
obtain a decryption key.

If the victim doesn’t make the first payment before the deadline, Maze will post the stolen data on its own public
website. It also uses social media accounts to alert the victim organization and their customers of the data breach.

According to third-party reports, the group will provide a decryption key to victims who pay, but it will still
frequently sell stolen data on underground markets—even if the victim has paid the ransom.

Maze will also provide RaaS to other attackers. The group frequently posts on hacking forums and underground
markets and it is also quite active on social media such as Twitter, often using it to taunt their victims.
Targeted Ransomware
White Paper

Sodinokibi
Sodinokibi (also known as REvil) first appeared in April 2019, although its creators have been involved in the
ransomware business for much longer, having been responsible for the older GandCrab ransomware which was
discontinued prior to the release of Sodinokibi.

Sodinokibi, like GandCrab, operates under the RaaS business model, leasing out its tools to a select number of
groups, known as affiliates, who perform the attacks. Profits are split between the Sodinokibi authors and their
affiliates. It is believed that many GandCrab affiliates transitioned to become Sodinokibi affiliates.

Figure 6: Organizations Affected by Sodinokibi Attacks, January 2019 to July 2020

30

25

20

15

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

Revil/Sodinokibi
Figure 7: Sodinokibi Attack Flow

Digital Adds .random


Certificate Characters Extension

Signed
Ransom Note
Revil
PowerShell CMD PsExec Distributes (ransom_a-z0-9_9-10)
Ransomware -readme.tx
Malicious
Phishing Macro Victim
Email Embedded Systems
Lure Doc
Shadow
WMI Deletes
Copy

Distributes log.bat File

AnyDesk
Various
Remote Distributes
Desktop Tool Hacktools
Targeted Ransomware
White Paper

The attacks usually begin with phishing emails with attached Word documents containing malicious macros. Once
on the victim’s network, the attackers will spend three to eight days performing the groundwork for an attack. In
common with many other targeted ransomware groups, Sodinokibi attacks tend to make extensive use of resources
within the victim’s environment along with publicly available tools to stage the environment before ransomware
payload execution. In this case, it uses PowerShell, WMI, PsExec, and the AnyDesk remote desktop tool. The
attackers also delete Windows Shadow Copies in order to hamper restoration of encrypted machines.

Sodinokibi has made a name for itself for targeting large organizations. Larger companies can afford to pay larger
ransoms and often have more to lose from having their data made publicly available. The group was linked to the
January 2020 attack on foreign exchange service Travelex which generated a $2.3 million ransom, far higher than
the average $260,000 seen in most enterprise ransomware attacks.

Sodinokibi was quick to copy the tactic of exfiltrating data from the victim’s network. The group usually posts a
sample to publicly available websites such as Pastebin to prove that the data has been stolen. The attackers then
apply further pressure to extort the victim by threatening to release the stolen information unless the ransom is
paid. For every hour the victim does not pay, more information is publicly released, and the amount of ransom
goes up.

Even if the victim pays the ransom, they may still lose their data, since Sodinokibi has also been observed selling
victim data on underground forums to the highest bidder.

Another interesting feature of Sodinokibi attacks is that in some cases, the attackers have been observed scanning
victim networks for credit card or point of sale (PoS) software. It is not clear at present if the attackers were
targeting this software for encryption or because they want to scrape this information as a way to make even more
money from this attack.

BitPaymer
BitPaymer has been linked to the Evil Corp cyber crime organization, which has subsequently begun using the
WastedLocker ransomware (also profiled in this paper).

Evil Corp made a name for itself for attacks involving the Dridex banking Trojan, but during 2017 it completely
overhauled its operations and moved into targeted ransomware. BitPaymer attacks began in June 2019 and
continued until June 2020, after which the group appears to have transitioned to WastedLocker.
Targeted Ransomware
White Paper

Figure 8: Organizations Affected by BitPaymer Attacks, January 2019 to July 2020

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

BitPaymer
Figure 9: BitPaymer Attack Flow

Malicious Downloads
URL

PowerShell Adds .locked Extension


Dridex Distributes PSExec
Empite

Drive-by
Download Bitpaymer Ransom Note
Browser Envokes Ransom (readme2unlock.txt)
Update Payload Presented

Admin Domain Victim


Mimicatz WMIC
Creds Controller Systems

BitPaymer attacks usually began by infecting the victim through phishing emails or exploit kits delivering fake
browser updates. In addition to this, the group had a large pool of potential victims which had been already
infected with its Dridex Trojan, providing the attackers with access to all previously compromised victims.

Dridex was not just used as an infection vector. The malware was also deployed against new victims. Dridex is
modular in nature and includes credential stealing capabilities and the ability to deliver additional malware. The
attackers essentially repurposed it from being their main payload to a tool used to stage the victim’s environment
for the ransomware attack.

Typically, BitPaymer attackers spent between five and eight days on the victim’s network prior to executing the
ransomware. In order to escalate privileges and move latterly across the network, the attackers leveraged many
of the system and administrative tools already present in the environment, aka living off the land. This reduced
any opportunity for defenders to identify malicious activity taking place, increasing the chance of a successful
compromise.

Attacks frequently began with the use of PowerShell (and the PowerShell Empire framework) to download Cobalt
Strike. Cobalt Strike is sold as a penetration testing tool, but is frequently used for malicious purposes.

Additionally, legitimate admin tools such as WMIC and PsExec were used to gain access, disable security software,
delete backup and restoration capabilities, and disperse and execute the BitPaymer payload.
Targeted Ransomware
White Paper

WastedLocker
WastedLocker is a new family of targeted ransomware linked to the Evil Corp cyber crime gang. It appears to have
begun operating around May 2020.

Attacks begin with a malicious JavaScript-based framework known as SocGholish which masquerades as a
software update. SocGholish has been found on more than 150 compromised websites, including dozens of U.S.
newspaper websites.

Figure 10: Organizations Affected by WastedLocker Attacks, January 2020 to July 2020

25

20

15

10

0
Jan Feb Mar Apr May Jun Jul
2020
Targeted Ransomware
White Paper

WastedLocker
Figure 11: WastedLocker Attack Flow

7zip File Manager

Chrome ZIP File e.g. JS File e.g. JS File e.g.


chrome.update.xx.zip chrome.update.xx.js 26c15d38.js

wscript.exe

Whoami net
user net group PowerShell

Loader
Net.WebClient
DownloadString

Injector

PSExec
CobaltStrike

Ransom.WastedLocker
mpcmdrun.exe
PowerShell
Ransom.WastedLocker
(:bin Alt. Data Stream)
Disable Windows
Defender WMI

WMI

Net Stop
Delete Shadow
Volumes

Once the attackers have a foothold on the victim’s network, PowerShell is used to download and execute a loader.
The loader contains a .NET injector along with a loader for Cobalt Strike Beacon, which is reportedly taken from an
open-source project called Donut, which is designed to help inject and execute in-memory payloads.

Cobalt Strike Beacon can be used to execute commands, inject other processes, elevate current processes or
impersonate other processes, and upload and download files. The Get-NetComputer command from PowerView
is renamed by the attackers to a random name. This command then searches for all the computer objects in
the Active Directory database with filter conditions like *server* or *2003* or *7* (returning all Windows Server,
Windows
4
Server 2003, or Windows 7 instances). The attackers then log this information in a .tmp file.
| Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Privilege escalation is performed using a publicly documented technique involving the Software Licensing User
Interface tool (slui.exe), a Windows command line utility that is responsible for activating and updating the
Windows operating system.

The attackers use the Windows Management Instrumentation Command Line Utility (wmic.exe) to execute
commands on remote computers, such as adding a new user or executing additional downloaded PowerShell
scripts. Cobalt Strike is also used to carry out credential dumping using ProcDump and to empty log files.

In order to deploy the ransomware, the attackers use the Windows Sysinternals tool PsExec to launch a legitimate
command line tool for managing Windows Defender (mpcmdrun.exe) to disable scanning of all downloaded files
and attachments, remove all installed definitions, and, in some cases, disable real-time monitoring.

PsExec is then used to launch PowerShell, which uses the win32_service WMI class to retrieve services and the net
stop command to stop these services. After Windows Defender is disabled and services have been stopped across
the organization, PsExec is used to launch the WastedLocker ransomware itself, which then begins encrypting data
and deleting shadow volumes.
Targeted Ransomware
White Paper

Miner: Ryuk, GoGalocker, and MegaCortex


In a 2019 paper, we found some links between the GoGalocker and MegaCortex ransomware families. Now we
have found stronger evidence that they, along with Ryuk, are controlled by a single adversary which we have
named Miner.

Figure 12: Organizations Affected by Ryuk Attacks, January 2019 to July 2020

35

30

25

20

15

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

Ryuk
Figure 13: Ryuk Attack Flow

Emotet
PowerShell
Malicious
Phishing Macro
Email Embedded
Lure Doc Deploys

Scheduled
PowerShell Uses Trickbot Task
(Persistence)

Bat Files
Admin PowerShell Deploys (Disable Security
Creds Empite Services)

Adds .RYK Extension


Deletes Shadow Copy
WMI
Elevated
Privaleges

Ryuk Ransom Note


Ransom (RyukReadMe.txt)
PsExec Presented
Payload
Victim
Systems
Targeted Ransomware
White Paper

While Miner has used differing ransomware payloads, its overall operational methodology has remained quite
consistent since it began mounting targeted ransomware attacks. While some tools have changed over time, the
operating procedure has not change much.

One component seen across all operations is the use of Cobalt Strike, which runs in the memory of infected
systems making detection difficult. Miner uses Cobalt Strike to download additional tools and to create a reverse
shell providing the attacker with additional access. Cobalt Strike is one of the few tools consistent in all operations
regardless of the ransom payload used in Miner’s attack.

In some cases, Miner uses Mimikatz to obtain victim credentials, while in others, the attackers leverage capabilities
found in TrickBot malware for the same purpose. In this case, Miner changed the tools used, but the tactic remained
the same. The methodology and steps involved in each attack should be used to identify Miner activity rather than
the tools themselves.

Figure 14: Organizations Affected by GoGalocker Attacks, January 2019 to July 2020

35

30

25

20

15

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

GoGalocker
Figure 15: GoGaLocker Attack Flow

Downloads
& Compiles

PowerShell Cobalt Strike


Malicious
Phishing Macro
Email Embedded
Lure Doc Reverse
Metasploit Shell
Mimikatz

System
WMI Enumeration/
Ad m i n Info Gathering
Creds

Adds .locked Extension


UAC
Wolf-X Disables
Elevated
Privaleges
Bat Files GoGalocker
R a n s om
PsExec Deploys (Disable Security R a n s om
Services) Payload Note

Victim
Systems
Targeted Ransomware
White Paper

In common with many other targeted ransomware attackers, Miner makes wide use of the resources found in the
victim’s environment. The attacks begin with phishing emails containing malicious documents that, if opened,
will infect the victim with Emotet or TrickBot malware. Emotet is designed to self-propagate across the victim’s
network by accessing open shares, making it a useful tool for lateral movement. TrickBot meanwhile has a
modular design, and can load components pertinent to the attack underway. In this case, TrickBot is used to steal
credentials in order to escalate privileges.

Publicly available malware such as Cobalt Strike and Metasploit are then used to enumerate the network for lateral
movement and increase privileges. Once this step is completed, Miner gains administrative access to domain
controllers. The attackers then uses batch files, deployed via PsExec, to disable and delete backup/restoration
capabilities and security services throughout the environment. At this point, the network is staged and ready for
the disbursement and execution of the ransomware payload.

Figure 16: Organizations Affected by MegaCortex Attacks, January 2019 to July 2020

12

10

0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul
2019 2020

MegaCortex
Figure 17: MegaCortex Attack Flow

Downloads
& Compiles

QakBot
PowerShell CobaltStrike

Phishing
Email Emotet
Reverse
Mimikatz Metasploit Shell

Adds .aes128ctr Extension

Steals

Bat Files
Admin (Disable Copies & MegaCortex
Deploys Ransom Ransom
Creds WMI Security Distributes PSExec Note
Services) Payload

Victim
Elevated Systems
Privileges
Targeted Ransomware
White Paper

Infrastructure Overlap:
Several IP addresses used by Miner to download Cobalt Strike were in the 89.105.198.XX IP space.
• 89.105.198.21 – GoGalocker attack
• 89.105.202.58 – GoGalocker attack
• 89.105.198.28 – MegaCortex attack

Bat Filename Similarities:


Bat files with uncommon names were used in attacks involving all three ransomware families.
• kill.bat – Used by MegaCortex, GoGalocker, Ryuk
• xaa.bat – Used by GoGalocker, Ryuk
• xab.bat – Used by GoGalocker, Ryuk
• xac.bat – Used by GoGalocker, Ryuk
• xaj.bat – Used by GoGalocker

Ransom Note Similarities:


Similarities have also been found in ransom notes

Figure 18: Ryuk Ransom Note


Targeted Ransomware
White Paper

Figure 19: GoGalocker Ransom Note

Figure 20: MegaCortex Ransom Note


Targeted Ransomware
White Paper

Infection Vectors
Targeted ransomware groups use a diverse range of distribution methods. Because of the relatively low prevalence
of targeted ransomware attacks, the infection vector can sometimes be difficult to establish. Targeted ransomware
groups often take their cues from espionage groups in their methods for gaining a foothold on the victim’s
network.

Phishing
Phishing is one of the most widely utilized infection vectors, with emails sent to employees disguised as
work-related correspondence (invoices, delivery confirmation, and so on). Some phishing campaigns may be
indiscriminate, a wide-ranging trawl for victims of interest. In other cases, attackers may pre-select their victim and
send spear-phishing emails to selected employees in the organization.

Spear-phishing campaigns may be tailored to the target, using subject matter relevant to the organization’s
business. If the recipient is tricked into opening a malicious attachment or following a malicious link, malware will be
downloaded to the victim’s machine, allowing the attackers to begin moving across the victim’s network.

Malvertising
Hitherto not known as an infection vector for ransomware, malvertising has been leveraged during 2020 by
the operators of WastedLocker. The group has been observed compromising media websites in order to serve
malicious ads containing a JavaScript-based framework known as SocGholish which masquerades as a software
update.

Vulnerability Exploitation
Another route on to an organization’s network is exploiting vulnerable software running on public-facing servers. In
most cases to date, zero-day vulnerabilities have not been used and the attackers exploited known vulnerabilities
in unpatched software, such as JBoss or Apache web server. One of the primary users of this tactic was the now
defunct SamSam group, which ceased operations in November 2019.

Secondary Infections
This is becoming an increasingly popular route into victim organizations. Cyber criminals are leveraging pre-existing
botnets in order to gain a foothold on the victim’s network. All it takes is for one computer on the network to be
compromised by the botnet in order to provide a way in.

The attackers behind BitPaymer leveraged their own Dridex botnet, which was originally built to mount financial
attacks, to give them a means of delivering the ransomware to organizations.

The Miner group, which is behind Ryuk, GoGalocker, and MegaCortex, has meanwhile used the Emotet botnet to
mount its attacks and may have leased access from Emotet’s operators.

Poorly Secured Services


Another infection vector comes from compromising poorly secured services. Crysis (also known as Dharma) has
repeatedly been observed attacking organizations through poorly secured RDP services, taking advantage of
leaked or weak credentials. The now defunct GandCrab group was observed scanning the internet for exposed
MySQL databases that it was then infecting with malware.
Targeted Ransomware
White Paper

Credential Theft and Lateral Movement


Targeted ransomware attacks can be broken down into four broad phases: initial compromise, privilege escalation/
credential theft, lateral movement, and encryption/deletion of backups.

Lateral movement is a key phase. The higher the proportion of computers that are encrypted, the greater the
likelihood of success from the attackers point of view.

Ransomware attackers tend to take their cues from espionage actors and deploy a similar range of tactics and
tools when performing lateral movement. In order to reduce the risk of detection, many (but not all) will eschew
custom malware and instead rely on hacking tools, commodity malware, and “living off the land” tactics—malicious
use of operating system features and administration tools.

The most frequently used include:


• PowerShell: Microsoft scripting tool that can be used to run commands to download payloads, traverse
compromised networks, and carry out reconnaissance.
• PsExec: Microsoft Sysinternals tool for executing processes on other systems. The tool is primarily used by
attackers to move laterally on victim networks.
• PsInfo: Another Microsoft Sysinternals tool that allows the user to gather information about other computers
on the network.
• Windows Management Instrumentation (WMI): Microsoft command line tool which can be used to execute
commands on remote computers.
• Mimikatz: Freely available tool capable of changing privileges, exporting security certificates, and recovering
Windows passwords in plaintext depending on the configuration.
• Cobalt Strike: Commodity malware that can be used to execute commands, inject other processes, elevate
current processes or impersonate other processes, and upload and download files. It can also be used to
perform credential dumping using ProcDump.
• Metasploit: Penetration testing framework that allows users to execute exploits on remote systems and
deliver payloads.
• AnyDesk: Legitimate, publicly available remote desktop tool.
• PuTTY: A command-line utility used to create SSH sessions.

Conclusion
The profusion of groups carrying out targeted ransomware attacks combined with the evolution in tactics to
include data theft along with encryption now means that targeted ransomware poses a significant threat to
organizations. Ransom demands running into millions of dollars are now not unusual and even organizations who
do not pay a ransom can sometimes face crippling cleanup costs along with reputational damage.

Defense in depth is key to blocking these kinds of attacks and knowing the attack chain utilized by most groups will
help identify security priorities. Combining an EDR solution with Endpoint Protection will maximize your chances of
discovering suspicious activity on your network before payloads can be deployed.
Targeted Ransomware
White Paper

Protection
Symantec has the following protection in place to protect customers against these attacks:

File-based Protection
• Ransom.Maze
• Ransom.Sodinokibi
• Ransom.BitPaymer
• Ransom.WastedLocker
• Ransom.Ryuk
• Ransom.Crysis
• Ransom.GoGalocker
• Ransom.MegaCortex
• Ransom.Robbinhood
• Hacktool.Mimikatz
• Backdoor.Cobalt (Cobalt Strike)
• Trojan.Agentemis (Cobalt Strike)

AI-based Protection
Symantec’s Targeted Attack Cloud Analytics (part of Symantec’s Endpoint Security Complete offering) leverages
advanced machine learning to spot patterns of activity associated with targeted attacks.

Threat Hunting
Symantec’s Threat Hunter team (part of Symantec’s Endpoint Security Complete offering) actively analyzes Cloud
Analytics alerts and investigates potential critical incidents. In June 2020, the Threat Hunter team identified dozens
of early stage WastedLocker attacks and was able to notify affected organizations before the attackers could
deploy their payload.

Endpoint Detection and Response (EDR)


Symantec EDR features Attack Chain Mitigation (ACM) provides enhanced early prevention capabilities. ACM
focuses on behaviors rather than files and can strengthen defenses against spear phishing and use of living-off-
the-land tools. For example, if Word doesn’t normally launch PowerShell in the customer environment, then this
should be placed in Block mode. EDR’s UI allows customers to easily understand which behaviors are common and
should be allowed, which are seen but should still be alerted on, and which are uncommon and should be blocked.
Customers can also address gaps reactively as part of investigating and responding to incident alerts. The incident
alert will show all behaviors that were observed as part of the breach and provides the capability to put this in
block mode right from the incident details page.
Targeted Ransomware
White Paper

Mitigation
Symantec recommends users observe the following best practices to protect against targeted ransomware attacks:

Local Environment
• Ensure you have the latest version of PowerShell and that you have logging enabled.
• Restrict access to RDP Services, only allow RDP from specific known IP addresses, and ensure you are using
multi-factor authentication.
• Use File Server Resource Manager (FSRM) to lock out the ability to write known ransomware extensions on
file shares where user write access is required.
• Create a plan to consider notification of outside parties. In order to ensure correct notification of required
organizations, such as the FBI or other law enforcement authorities/agencies, be sure to have a plan in place
to verify.
• Create a “jump bag” with hard copies and archived soft copies of all critical administrative information.
In order to protect against the compromise of the availability of this critical information, store it in a jump bag
with hardware and software needed to troubleshoot problems. Storing this information on the network is not
helpful when network files are encrypted.
• Implement proper audit and control of administrative account usage. You could also implement one-time
credentials for administrative work to help prevent theft and usage of admin credentials.
• Create profiles of usage for admin tools. Many of these tools are used by attackers to move laterally
undetected through a network. A user account that has a history of running as admin using PsInfo/PsExec
on a small number of systems is probably fine, but a service account running PsInfo/PsExec on all systems is
suspicious.

Email
• Enable 2FA to prevent compromise of credentials during phishing attacks.
• Harden security architecture around email systems to minimize the amount of spam that reaches end-user
inboxes and ensure you are following best practices for your email system, including the use of SPF and other
defensive measures against phishing attacks.

Backup
• Implement offsite storage of backup copies. Arrange for offsite storage of at least four weeks of weekly full
and daily incremental backups.
• Implement offline backups that are onsite. Make sure you have backups that are not connected to the
network to prevent them from being encrypted by ransomware.
• Verify and test your server-level backup solution. This should already be part of your Disaster Recovery
process.
• Secure the file-level permissions for backups and backup databases. Don’t let your backups get encrypted.
• Test restore capability. Ensure restore capabilities support the needs of the business.
Targeted Ransomware
White Paper

Appendix 1: Dwell Time Analysis


Dwell time is the time between the attacker’s initial access of the victim’s environment up to the attempted
execution of the ransomware payload. This provides data points on how much time is spent on the network by
the attacker before encrypting the victim’s data. In theory, this window of time is the last chance the victim has
to identify the activity before falling victim to ransomware and provides additional data on how much time the
adversary needs to spend staging the environment before the final attack phase. We analyzed attacks by five
different ransomware families where we had data on dates of initial intrusion and attempted payload execution.

Ransomware Dwell time (days)

Ryuk 14 days

BitPaymer 5 days

Maze 14 days

Sodinokibi 8 days

GoGalocker 2 days

Appendix 2: MITRE ATT&CK® Techniques


The following Mitre ATT&CK techniques have been used by targeted ransomware operators:

Group Technique ID Technique name Technique use

Access Token Ryuk has attempted to adjust its token privileges to have
Ryuk T1134
Manipulation the SeDebugPrivilege.

Boot or Logon Ryuk has used the Windows command line to create a Registry entry
Ryuk T1547 Autostart under HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\
Execution CurrentVersion\Run to establish persistence.

Command
Ryuk T1059 and Scripting Ryuk has used cmd.exe to create a Registry entry to establish persistence.
Interpreter

Ryuk has used a combination of symmetric (AES) and asymmetric (RSA)


Data Encrypted for encryption to encrypt files. Files have been encrypted with their own AES
Ryuk T1486
Impact key and given a file extension of .RYK. Encrypted directories have had a
ransom note of RyukReadMe.txt written to the directory.

File and Directory Ryuk has called GetLogicalDrives to emumerate all mounted drives,
Ryuk T1083
Discovery and GetDriveTypeW to determine the drive type.

Ryuk T1562 Impair Defenses Ryuk has stopped services related to anti-virus.

Ryuk has used vssadmin Delete Shadows /all /quiet to to delete volume
Inhibit System
Ryuk T1490 shadow copies and vssadmin resize shadowstorage to force deletion of
Recovery
shadow copies created by third-party applications.

Ryuk has constructed legitimate appearing installation folder paths by


calling GetWindowsDirectoryW and then inserting a null byte at the fourth
Ryuk T1036 Masquerading
character of the path. For Windows Vista or higher, the path would appear
as C:\Users\Public.

Ryuk has used multiple native APIs including ShellExecuteW to


run executables,GetWindowsDirectoryW to create folders,
Ryuk T1106 Native API
and VirtualAlloc, WriteProcessMemory, and CreateRemoteThread
for process injection.

Ryuk has called CreateToolhelp32Snapshot to enumerate all running


Ryuk T1057 Process Discovery
processes.
Targeted Ransomware
White Paper

Group Technique ID Technique name Technique use

Ryuk has injected itself into remote processes to encrypt files


Ryuk T1055 Process Injection using a combination of VirtualAlloc, WriteProcessMemory,
and CreateRemoteThread.

Ryuk has called kill.bat for stopping services, disabling services and killing
Ryuk T1489 Service Stop
processes.

System Network
Ryuk has called GetIpNetTable in attempt to identify all mounted drives
Ryuk T1016 Configuration
and hosts that have Address Resolution Protocol (ARP) entries.
Discovery

Application Layer
Maze T1071 Maze has communicated to hard-coded IP addresses via HTTP.
Protocol

Command
The Maze encryption process has used batch scripts with various
Maze T1059 and Scripting
commands.
Interpreter

Maze has disrupted systems by encrypting files on targeted machines,


Data Encrypted for claiming to decrypt files if a ransom payment is made. Maze has used the
Maze T1486
Impact ChaCha algorithm, based on Salsa20, and an RSA algorithm to encrypt
files.

Maze has forged POST strings with a random choice from a list of
Maze T1568 Dynamic Resolution possibilities including “forum”, “php”, “view”, etc. while making connection
with the C2, hindering detection efforts.

Maze has disabled dynamic analysis and other security tools including IDA
Maze T1562 Impair Defenses
debugger, x32dbg, and OllyDbg.

Maze has used the “Wow64RevertWow64FsRedirection” function


Indicator Removal
Maze T1070 following attempts to delete the shadow volumes, in order to leave the
on Host
system in the same state as it was prior to redirection.

Inhibit System Maze has attempted to delete the shadow volumes of infected machines,
Maze T1490
Recovery once before and once after the encryption process.

Maze has used several Windows API functions throughout the encryption
Maze T1106 Native API process including IsDebuggerPresent, TerminateProcess, Process32FirstW,
among others.

Maze has decrypted strings and other important information during the
Obfuscated Files or
Maze T1027 encryption process. Maze also calls certain functions dynamically to hinder
Information
analysis.

Maze has inserted large blocks of junk code, including some components
Maze Binary Padding to decrypt strings and other important information for later in the
encryption process.

Maze T1057 Process Discovery Maze has gathered all of the running system processes.

Maze T1055 Process Injection Maze has injected the malware DLL into a target process.

System Information Maze has checked the language of the infected system using the
Maze T1082
Discovery “GetUSerDefaultUILanguage” function.

System Network Maze has used the “WNetOpenEnumW”, “WNetEnumResourceW”,


Maze T1049 Connections “WNetCloseEnum” and “WNetAddConnection2W” functions to enumerate
Discovery the network resources on the infected machine.

Windows
Maze has used “wmic.exe” attempting to delete the shadow volumes on
Maze T1047 Management
the machine.
Instrumentation

Command
RobbinHood T1059 and Scripting RobbinHood uses cmd.exe on the victim’s computer.
Interpreter
Targeted Ransomware
White Paper

Group Technique ID Technique name Technique use

Data Encrypted for RobbinHood will search for an RSA encryption key and then perform its
RobbinHood T1486
Impact encryption process on the system files.

RobbinHood will search for Windows services that are associated with
RobbinHood T1562 Impair Defenses
antivirus software on the system and kill the process.

Indicator Removal RobbinHood disconnects all network shares from the computer with the
RobbinHood T1070
on Host command net use * /DELETE /Y.

Inhibit System RobbinHood deletes shadow copies to ensure that all the data cannot be
RobbinHood T1490
Recovery restored easily.

RobbinHood stops 181 Windows services on the system before beginning


RobbinHood T1489 Service Stop
the encryption process.

Command
SamSam T1059 and Scripting SamSam uses custom batch scripts to execute some of its components.
Interpreter

Data Encrypted for SamSam encrypts victim files using RSA-2048 encryption and demands a
SamSam T1486
Impact ransom be paid in Bitcoin to decrypt those files.

Indicator Removal SamSam has been seen deleting its own files and payloads to make
SamSam T1070
on Host analysis of the attack more difficult.

Obfuscated Files or SamSam has been seen using AES or DES to encrypt payloads and
SamSam T1027
Information payload components.

Account Access GoGalocker has been observed changing account passwords and logging
GoGalocker T1531
Removal off current users.

GoGalocker has encrypted files, including core Windows OS files, using


Data Encrypted for
GoGalocker T1486 RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption
Impact
key.

GoGalocker installation has been immediately preceded by a “task kill”


GoGalocker T1562 Impair Defenses
command in order to disable anti-virus.

Indicator Removal GoGalocker has been observed deleting its original launcher after
GoGalocker T1070
on Host execution.

GoGalocker has been observed moving around the victim network via
Lateral Tool
GoGalocker T1570 SMB, indicating the actors behind this ransomware are manually copying
Transfer
files form computer to computer instead of self-propagating.

Subvert Trust GoGalocker has been signed with stolen certificates in order to make it
GoGalocker T1553
Controls look more legitimate.

System Shutdown/
GoGalocker T1529 GoGalocker has been observed shutting down infected systems.
Reboot

For product information and a complete list of distributors, visit our website at: broadcom.com
Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
© 2015-2020, The MITRE Corporation. MITRE ATT&CK and ATT&CK are registered trademarks of The MITRE Corporation.
SED-TR-WP103 October 7, 2020

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy