{"id":12173,"date":"2018-05-01T09:10:04","date_gmt":"2018-05-01T17:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/01\/news-5942\/"},"modified":"2018-05-01T09:10:04","modified_gmt":"2018-05-01T17:10:04","slug":"news-5942","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/01\/news-5942\/","title":{"rendered":"SamSam ransomware: what you need to know"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 01 May 2018 15:54:54 +0000<\/strong><\/p>\n<p>SamSam ransomware is a custom infection used in targeted attacks, often deployed using a wide range of exploits or brute-force tactics.\u00a0Based on our own run-ins with the infection, we&#8217;ve observed that attacks were made on targets via <a href=\"https:\/\/www.infoworld.com\/article\/3058254\/security\/patch-jboss-now-to-prevent-samsam-ransomware-attacks.html\" target=\"_blank\" rel=\"noopener\">vulnerable JBoss host servers<\/a>\u00a0during a previous wave of SamSam attacks in 2016 and 2017.<\/p>\n<p>In 2018, SamSam uses either vulnerabilities in remote desktop protocols (RDP), Java-based web servers, or file transfer protocol (FTP) servers to gain access to the victims\u2019 network or brute force against weak passwords to obtain an initial foothold. From there, the ransomware &#8220;fun and games&#8221; begin for the authors. For everyone else, it&#8217;s chaos.<\/p>\n<h3>The ties that bind<\/h3>\n<p>A common thread tying all of these attacks together is the use of the word &#8220;sorry&#8221; in ransom notes, URLs, and even infected files. It&#8217;s made hundreds of thousands of dollars so far, and it&#8217;s caused no end of trouble in the US for <a href=\"https:\/\/www.wired.com\/story\/atlanta-ransomware-samsam-will-strike-again\/\" target=\"_blank\" rel=\"noopener\">cities like Atlanta<\/a>.<\/p>\n<p>Here&#8217;s what a typical ransom splash screen looks like:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23500\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/attachment\/samsam-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam.jpg\" data-orig-size=\"1574,805\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"samsam ransom\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam-300x153.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam-600x307.jpg\" class=\"aligncenter wp-image-23500 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam-600x307.jpg\" alt=\"samsam ransom\" width=\"600\" height=\"307\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam-600x307.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam-300x153.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/samsam.jpg 1574w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>The ransom note is quite interesting, giving the option of randomly-selected file encryption (if you don&#8217;t pay the full amount). They&#8217;ll also unlock one file for free as a token of trust that they will give your files back after payment. It reads as follows:<\/p>\n<blockquote>\n<p><em><strong>What happened to your files?<br \/> <\/strong><\/em><br \/> <em>All your files encrypted with RSA-2048 encryption, for more information search in Google &#8220;RSA encryption&#8221;<\/em><\/p>\n<p><em><strong>How to recover files?<\/strong><\/em><\/p>\n<p><em>RSA is a asymmetric cryptographic algorithm, you need one key for encryption and one key for decryption so you need private key to recover your files. It&#8217;s not possible to recover your files without private key.<\/em><\/p>\n<p><em><strong>How to get private key?<\/strong><\/em><\/p>\n<p><em>You can get your private key in 3 easy steps:<\/em><br \/> <em><strong>1)<\/strong> You must send us 0.8 Bitcoin for each affected PC or 4.5 Bitcoins to receive all private keys for all affected PCs.<\/em><br \/> <em><strong>2)<\/strong> After you send us 0.8 Bitcoin, leave a comment on our site with this detail: just write your host name in your comment<\/em><br \/> <em><strong>3)<\/strong> We will reply to your comment with a decryption software, you should run it on your affected PC and all encrypted files will be recovered<\/em><\/p>\n<p><em>With buying the first key you will find that we are honest<\/em><\/p>\n<\/blockquote>\n<p>Ransomware authors rely on the victim viewing their odd code of &#8220;honesty&#8221; as important, or else nobody would dare to pay up.<\/p>\n<p>I should also mention, before we go any further, that we do protect against this specific threat, which we detect as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/ransom-samas\/\" target=\"_blank\" rel=\"noopener\">Ransom.Samas<\/a>:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23501\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/attachment\/samsam_mb3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665.png\" data-orig-size=\"470,243\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SamSam detection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665-300x155.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665.png\" class=\"aligncenter wp-image-23501 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665.png\" alt=\"SamSam detection\" width=\"470\" height=\"243\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665.png 470w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SamSam_MB3-e1525121591665-300x155.png 300w\" sizes=\"auto, (max-width: 470px) 100vw, 470px\" \/><\/a><\/p>\n<p>The SamSam group have been making waves since late 2015,\u00a0<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/lesson-patching-rise-samsam-crypto-ransomware\/\" target=\"_blank\" rel=\"noopener\">causing trouble in 2016<\/a>, and starting to <a href=\"https:\/\/www.zdnet.com\/article\/samsam-ransomware-now-demands-33000-from-victims\/\" target=\"_blank\" rel=\"noopener\">regularly increase the cost of their ransom<\/a> in 2017.\u00a0Colorado and Atlanta have both had run-ins with SamSam recently, as you may have seen from ongoing news coverage.<\/p>\n<p>One would think SamSam has been around long enough for organizations to be able to deal with it effectively, but it&#8217;s still here, and still locking up machines in targeted attacks.<\/p>\n<p>You can trace SamSam&#8217;s first2018 appearance in back to January. There&#8217;s &#8220;persistent&#8221; and then there&#8217;s SamSam.<\/p>\n<h3>January: Sorry, not sorry<\/h3>\n<p>Hospitals, city municipalities, and many more from Indiana to New Mexico were <a href=\"https:\/\/www.titanhq.com\/blog\/samsam-ransomware-strain-kicks-off-2018\" target=\"_blank\" rel=\"noopener\">all struck down by SamSam<\/a>\u00a0in varying degrees of severity. A hospital in Indiana, in particular, was reduced to working with pen and paper in stormy weather. They decided to <a href=\"https:\/\/www.zdnet.com\/article\/us-hospital-pays-55000-to-ransomware-operators\/\" target=\"_blank\" rel=\"noopener\">pay the ransom<\/a> and get systems back up and running, given the cost of the fix was more than the ransom. This is an organization that had backups in place, unlike many other ransomware victims. All the same, by attacking a service offering life-saving treatment to patients, staff were left with few options.<\/p>\n<p>Though you&#8217;ll find conflicting advice on paying the ransom, and while appreciating that every case is different, we generally advise not to do it. By handing over the cash, you&#8217;re giving the green light to the hackers to carry on doing it. If it works the first time, why not the second or third?<\/p>\n<p>This is the already fraught situation healthcare professionals and departments responsible for day-to-day management of city services find themselves in as we head into February.<\/p>\n<h3>February: Slow traffic blues<\/h3>\n<p>In February, the Colorado Department of Transportation had to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/samsam-ransomware-hits-colorado-dot-agency-shuts-down-2-000-computers\/\" target=\"_blank\" rel=\"noopener\">shut down 2,000 (non critical) systems<\/a> as they, too, were hit by a SamSam outbreak. Bitcoin was once again what the hackers were after; the CDT decided that they <a href=\"http:\/\/denver.cbslocal.com\/2018\/02\/21\/ransomware-hits-cdot-computers\/\" target=\"_blank\" rel=\"noopener\">weren&#8217;t going to pay up<\/a>, but restore their backups instead.<\/p>\n<h3>March: Atlanta ransomware resurgent<\/h3>\n<p>All of the worst problems of SamSam effectively rolled into one large pile of misery for the city of Atlanta, who had a serious case of the SamSam blues:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">The City of Atlanta is currently experiencing outages on various customer facing applications, including some that customers may use to pay bills or access court-related information. We will post any updates as we receive them. <a href=\"https:\/\/t.co\/kc51rojhBl\">pic.twitter.com\/kc51rojhBl<\/a><\/p>\n<p>\u2014 City of Atlanta, GA (@Cityofatlanta) <a href=\"https:\/\/twitter.com\/Cityofatlanta\/status\/976864741145694208?ref_src=twsrc%5Etfw\">March 22, 2018<\/a><\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/platform.twitter.com\/widgets.js\">https:\/\/platform.twitter.com\/widgets.js<\/a><\/p>\n<p>They were faced with the prospect of paying $6,800 per machine to unlock the encrypted files, or a cool $51,000 to recover everything across all compromised computers. As to how the attackers got in, one researcher noted a potential EternalBlue route:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">C&#8217;mon <a href=\"https:\/\/twitter.com\/Cityofatlanta?ref_src=twsrc%5Etfw\">@Cityofatlanta<\/a>&#8230; SMBv1 open on web.atlantaga[.]gov to the internet? Have we learned nothing!?<a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#ransomware<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Atlanta?src=hash&amp;ref_src=twsrc%5Etfw\">#Atlanta<\/a> <a href=\"https:\/\/t.co\/t35SalTcEE\">pic.twitter.com\/t35SalTcEE<\/a><\/p>\n<p>\u2014 Reggie (@Ring0x0) <a href=\"https:\/\/twitter.com\/Ring0x0\/status\/977230686661894144?ref_src=twsrc%5Etfw\">March 23, 2018<\/a><\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/platform.twitter.com\/widgets.js\">https:\/\/platform.twitter.com\/widgets.js<\/a><\/p>\n<p>Regardless of the method used, the big problem here is that 10 days after initial infection, they were still struggling to get back to full strength, with no less than five out of 13 departments hit in the original malware blast. Just like the Indiana hospital staff were forced to use pen and paper, so too were law enforcement in Atlanta\u2014and they also <a href=\"https:\/\/www.reuters.com\/article\/usa-cyber-atlanta\/rpt-with-paper-and-phones-atlanta-struggles-to-recover-from-cyber-attack-idUSL1N1RD0D5\" target=\"_blank\" rel=\"noopener\">lost some police records<\/a> in the bargain.<\/p>\n<p>Note that three city council staffers had to work on a &#8220;clunky personal laptop.&#8221; So now we&#8217;re introducing personal machines onto a network dealing with potentially sensitive data, already hammered by opportunistic malware infections. One hopes that the machine had at least been checked for infections or potential vulnerabilities, but it would be surprising if the already busy IT staff checked if the employee had installed all security patches.<\/p>\n<p>You could say the ransom was &#8220;only&#8221; $51,000\u2014except the ransomware authors pulled the payment page and left Atlanta carrying the can. Ultimately, the SamSam outbreak cost the city of Atlanta a terrifying <a href=\"https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/\" target=\"_blank\" rel=\"noopener\">$2.6 million dollars<\/a> to set a $50k infection right.<\/p>\n<p>It isn&#8217;t just fixing some computers. There&#8217;s everything from forensics and insurance to extra staff and crisis comms to consider. This is the very real cost of attempting to recover from an infection\u2014and that&#8217;s while trying to offer <a href=\"https:\/\/www.wired.com\/story\/atlanta-ransomware-samsam-will-strike-again\/\" target=\"_blank\" rel=\"noopener\">public-facing services<\/a> potentially impacted by the attack.<\/p>\n<h3>Fighting ransomware<\/h3>\n<p>Ransomware may be experiencing a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/ransomwares-difficult-second-album\/\" target=\"_blank\" rel=\"noopener\">drop in popularity<\/a> but make no mistake\u2014the impact can be horrendous. As a reminder, here are some ways local governments and other organizations can fend off these attacks:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/3-2-1-go-make-backups-of-your-data\/\" target=\"_blank\" rel=\"noopener\">Backups are essential<\/a>, and help to reduce some of the impact from a ransomware attack. A word of caution: your backups have to be logical and easy to implement if needed. All too often, organizations throw everything into a jumble of files and folders, with duplication galore and no real instructions as to where everything should go.<\/li>\n<li>Staff training. It&#8217;s arguable that the automated systems in place should stop attacks long before reaching the human component of your network, but giving staff a crash course in security basics is always a good idea.<\/li>\n<li>Spam filtering for email-based attacks (fake PDF invoices, booby-trapped Word documents insisting you enable Macros and the like).<\/li>\n<li>Disable unnecessary exposed services facing the Internet, a time-honored way in for ransomware infections everywhere.<\/li>\n<li>Change default\/easy-to-guess passwords on all of your systems and services (not just the &#8220;important&#8221; ones, because ultimately someone will find their way in on the supposedly unimportant ones instead).<\/li>\n<li>Choose your vendors <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2016\/12\/vetting-your-vendors-money-isnt-everything\/\" target=\"_blank\" rel=\"noopener\">wisely<\/a>.<\/li>\n<\/ul>\n<h3>SamSam: not gone, and not forgotten<\/h3>\n<p>Money makes the world go round, and for SamSam their currency of choice is Bitcoin. Make no mistake, business is good; they&#8217;re estimated to have racked up <a href=\"https:\/\/www.csoonline.com\/article\/3263693\/security\/samsam-ransomware-attacks-have-earned-nearly-850-000.html\" target=\"_blank\" rel=\"noopener\">around $850,000<\/a> in profit and they show no sign of slowing down. Consider that their estimated $850k profit is still nowhere near the cost of recovery for the City of Atlanta alone, and then take into account how much cleanup has cost for everyone else affected so far.<\/p>\n<p>No matter your reason for being online, and regardless of which industry you operate in, I think we can all agree warding off an attack such as the ones above should be foremost in your mind when allocating a budget to security threats. SamSam isn&#8217;t going away anytime soon, and unfortunately the same can be said for other infections waiting to strike. It only takes one moment of inattentiveness, and you could be faced with some difficult decisions indeed.<\/p>\n<p><em>Thanks to Marcelo for screenshots and additional information.<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/\">SamSam ransomware: what you need to know<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 01 May 2018 15:54:54 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/' title='SamSam ransomware: what you need to know'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_702680680.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at SamSam ransomware, the malware that messed with Atlanta, and tell you how it works and what you can do to combat it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/atlanta-ransomware\/\" rel=\"tag\">atlanta ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom\/\" rel=\"tag\">ransom<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/samsam\/\" rel=\"tag\">samsam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/samsam-ransomware\/\" rel=\"tag\">samsam ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/' title='SamSam ransomware: what you need to know'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/\">SamSam ransomware: what you need to know<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18275,4503,10987,3764,18276,3765,17453,18277],"class_list":["post-12173","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-atlanta-ransomware","tag-cybercrime","tag-exploits","tag-malware","tag-ransom","tag-ransomware","tag-samsam","tag-samsam-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12173"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12173\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12173"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}