{"id":6325,"date":"2017-01-23T15:50:22","date_gmt":"2017-01-23T23:50:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-163\/"},"modified":"2017-01-23T15:50:22","modified_gmt":"2017-01-23T23:50:22","slug":"news-163","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-163\/","title":{"rendered":"MSRT July 2016 \u2013 Cerber ransomware"},"content":{"rendered":"<p>As part of our ongoing effort to provide better malware protection, the July 2016 release of the <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/malicious-software-removal-tool-details.aspx\">Microsoft Malicious Software Removal Tool<\/a> (MSRT) includes detection for <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Cerber\">Win32\/Cerber<\/a>, a prevalent ransomware family. The inclusion in MSRT complements our Cerber-specific family detections in Windows Defender, and our ransomware-dedicated cloud protection features.<\/p>\n<p>We started seeing Cerber in February 2016, and since then it has continuously evolved and is now one of the most encountered ransomware families \u2013 beating both <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Exxroute.A\">Exxroute<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Locky\">Locky<\/a>. The evolution is mostly based around the way in which Cerber is being distributed \u2013 with a focus on exploit kits, compromised websites, and email distribution.<\/p>\n<p>When looking at data for the past 30 days, Cerber is the most detected ransomware, taking over a quarter of all ransomware infections.<\/p>\n<table style=\"width: 40%;border: 0.5px\">\n<tbody>\n<tr style=\"border: 0.5px solid #70AD47;background: #70AD47\">\n<td style=\"color: #ffffff;font-weight: 600;font-size: 1.1em;border-bottom: 0.5px solid white;text-align: left;padding: 4px\"><strong>Ransomware family<\/strong><\/td>\n<td style=\"color: #ffffff;font-weight: 600;font-size: 1.1em;border-bottom: 0.5px solid white;text-align: left;padding: 4px\"><strong>Share<\/strong><\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Cerber<\/strong><\/td>\n<td style=\"padding: 4px\">25.97%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Exxroute<\/strong><\/td>\n<td style=\"padding: 4px\">15.39%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Locky<\/strong><\/td>\n<td style=\"padding: 4px\">12.80%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Brolo<\/strong><\/td>\n<td style=\"padding: 4px\">11.66%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Crowti<\/strong><\/td>\n<td style=\"padding: 4px\">9.97%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>FakeBsod<\/strong><\/td>\n<td style=\"padding: 4px\">9.19%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Teerac<\/strong><\/td>\n<td style=\"padding: 4px\">3.94%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Critroni<\/strong><\/td>\n<td style=\"padding: 4px\">3.72%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Reveton<\/strong><\/td>\n<td style=\"padding: 4px\">2.86%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Troldesh<\/strong><\/td>\n<td style=\"padding: 4px\">1.21%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Ranscrape<\/strong><\/td>\n<td style=\"padding: 4px\">1.18%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Sarento<\/strong><\/td>\n<td style=\"padding: 4px\">0.76%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Urausy<\/strong><\/td>\n<td style=\"padding: 4px\">0.70%<\/td>\n<\/tr>\n<tr style=\"border: 0.5px solid #70AD47;background: #E2EFDA\">\n<td style=\"padding: 4px\"><strong>Genasom<\/strong><\/td>\n<td style=\"padding: 4px\">0.65%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Cerber is especially prevalent in the US, Asia, and Western Europe.<\/p>\n<p>However, infections occur across the globe, and the following heat map demonstrates the geographical spread of infected machines:<br \/> <a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/heatmap.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1210\" height=\"643\" class=\"aligncenter size-full wp-image-8005\" alt=\"Map showing highlighted areas in Eastern US, Western Europe, Asia, South America\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/heatmap.png\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Cerber infection chain<\/h2>\n<p>Cerber can enter your system or PC either through downloaders from spam email or <a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/glossary.aspx#exploit\">exploits<\/a> on malicious or compromised sites.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/cerber.png\"><img loading=\"lazy\" decoding=\"async\" width=\"274\" height=\"300\" class=\"wp-image-8035 size-medium alignright\" alt=\"Diagram showing spam email using macro and scripts to install cerber onto a PC\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/cerber-274x300.png\" \/><\/a><\/p>\n<p>When delivered via spam, we\u2019ve seen the use of both macros and OLE objects to deliver Cerber. We described how malware authors can maliciously use OLE in our blog &#8220;<a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/06\/14\/wheres-the-macro-malware-author-are-now-using-ole-embedding-to-deliver-malicious-files\/\">Where\u2019s the macro?<\/a>&#8220;, and we\u2019ve <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/category\/research\/macro-malware\/\">previously talked about how macros have been used to deliver malware<\/a> (although <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/22\/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection\/\">new features in Office 2016<\/a> has seen a decrease in macro-based malware).<\/p>\n<p>In this case, we\u2019ve seen malicious files using VisualBasic Script (VBS) and JavaScript to download Cerber from a command and control (C2) server. We\u2019ve also seen malicious macros both downloading Cerber, and dropping VBS scripts that then download Cerber.<\/p>\n<p>The other infection vector \u2013 exploit kits \u2013 occurs when a user visits a malicious or compromised website that hosts an exploit kit. The exploit kit checks for vulnerabilities on the PC, and tailors an infection to target those vulnerabilities. This allows the exploit kit to download Cerber onto the PC.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=HTML\/NeutrinoEK\">Neutrino<\/a>, Angler, and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Exploit:HTML\/Pangimop\">Magnitude<\/a> exploit kits have been identified as distributing Cerber.<\/p>\n<p>&nbsp;<\/p>\n<h2>Cerber updates<\/h2>\n<p>As with most other encryption ransomware, Cerber encrypts files and places \u201crecovery\u201d instructions in each folder. Cerber provides the instructions both as .html and .txt formats, and replaces the desktop wallpaper.<\/p>\n<p>Cerber, however, also includes a synthesized audio message.<\/p>\n<p>We described the Cerber infection process in detail in our blog &#8220;<a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/09\/the-three-heads-of-the-cerberus-like-cerber-ransomware\/\">The three heads of the Cerberus-like Cerber ransomware<\/a>&#8220;.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/final.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"292\" title=\"Cerber ransom note\" class=\"wp-image-8045 size-medium alignleft\" alt=\"Screencap showing a long note explaining how a user was infected\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/note-thumb-300x292.png\" \/><\/a>There have been some updates to this family, however, including a much more detailed description of how ransomware encryption works, and how users can recover their files.<\/p>\n<p>Note that the ransom message now makes claims about Cerber attempting to help make the Internet a safer place, and they don\u2019t mention the payment of fees or ransom to decrypt your files.<\/p>\n<p>Upon investigation, however, we have determined (as of July 8, 2016) that they are asking for a ransom in the form of bitcoins, as shown in the following screenshot of the Tor webpage:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/61159204.png\"><img loading=\"lazy\" decoding=\"async\" width=\"934\" height=\"379\" class=\"aligncenter wp-image-8015 size-full\" alt=\"Note showing that Cerber is request bitcoin payment to decrypt files\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/61159204.png\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The Cerber desktop wallpaper has also been updated:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/wallpaper.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"908\" height=\"682\" class=\"aligncenter size-full wp-image-8055\" alt=\"Grey wallpaper with a few lines of black text showing links to decrypt files\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/07\/wallpaper.jpg\" \/><\/a><\/p>\n<p><em>\u00a0<\/em><\/p>\n<h2>Prevention<\/h2>\n<p>To help stay protected:<\/p>\n<ul>\n<li>Keep your Windows Operating System and antivirus <a href=\"http:\/\/www.microsoft.com\/security\/portal\/mmpc\/help\/updatesoftware.aspx\">up-to-date<\/a> and, if you haven\u2019t already, upgrade to <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-upgrade\">Windows 10<\/a>.<\/li>\n<li>Regularly back-up your files in an external hard-drive<\/li>\n<li>Download and apply security patches associated with the exploit kits that are known to distribute this ransomware (for example: <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=HTML\/NeutrinoEK\">Neutrino<\/a>).<\/li>\n<li>Enable file history or system protection. On Windows 10 and Windows 8.1, <a target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-au\/help\/17128\/windows-8-file-history\">set up a drive for file history<\/a><\/li>\n<li>Use OneDrive for Business<\/li>\n<li>Beware of <a href=\"https:\/\/blogs.technet.microsoft.com\/office365security\/how-to-review-and-mitigate-the-impact-of-phishing-attacks-in-office-365\/\">phishing emails<\/a>, spams, and clicking malicious attachment<\/li>\n<li><a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">Use Microsoft Edge to get SmartScreen protection<\/a>. It can help warn you about sites that are known to be hosting exploits, and help protect you from socially-engineered attacks such as phishing and malware downloads.<\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/02\/24\/locky-malware-lucky-to-avoid-it\/\">Disable the loading of macros in your Office programs<\/a><\/li>\n<li>Disable your Remote Desktop feature whenever possible<\/li>\n<li>Use two factor authentication<\/li>\n<li>Use a safe Internet connection<\/li>\n<li>Avoid browsing web sites that are known for being malware breeding grounds (such as illegal music, movies and TV, and software download sites)<\/li>\n<\/ul>\n<h2>Detection<\/h2>\n<ul>\n<li>Ensure your antimalware protection (such as <a href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/using-defender#1TC=windows-10\">Windows Defender<\/a>) is up-to-date and working correctly.<\/li>\n<li>Enable <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/14\/maps-in-the-cloud-how-can-it-help-your-enterprise\/\">Microsoft Active Protection Service (MAPS)<\/a> to get the latest cloud-based ransomware detection and blocking.<\/li>\n<\/ul>\n<h2>Recovery<\/h2>\n<p>In the Office 365 blog\u00a0&#8220;<a href=\"https:\/\/blogs.technet.microsoft.com\/office365security\/how-to-deal-with-ransomware\/\">How to deal with ransomware<\/a>&#8220;, there are several options on how you might be able to remediate or recover from a ransomware attack, including <a href=\"http:\/\/windows.microsoft.com\/en-US\/windows-8\/how-use-file-history\">backup and recovery using File History in Windows 10<\/a> and <a href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/previous-versions-files-faq\">System Restore in Windows 7<\/a>.<\/p>\n<p>You can also use OneDrive and SharePoint to backup and restore your files:<\/p>\n<ul>\n<li>OneDrive for Business and SharePoint:\n<ul>\n<li><a href=\"https:\/\/support.office.com\/en-us\/article\/Restore-a-previous-version-of-a-document-in-OneDrive-for-Business-159cad6d-d76e-4981-88ef-de6e96c93893\">Restore a previous version of a document in OneDrive for Business<\/a><\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/akieft\/2012\/01\/09\/restore-options-in-sharepoint-online\/\">Restore Option in SharePoint Online<\/a><\/li>\n<\/ul>\n<\/li>\n<li>OneDrive for home users:\n<ul>\n<li><a href=\"https:\/\/support.office.com\/en-us\/article\/Find-lost-or-missing-files-in-OneDrive-0d929e0d-8682-4295-982b-4bd75a3daa01\">Find lost or missing files in OneDrive<\/a><\/li>\n<li><a href=\"https:\/\/support.office.com\/en-us\/article\/Delete-or-restore-files-and-folders-949ada80-0026-4db3-a953-c99083e6a84f\">Delete or restore files and folders<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><em>\u00a0<\/em><\/p>\n<p><em>Carmen Liang and Patrick Estavillo MMPC<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/07\/12\/msrt-july-2016-cerber-ransomware\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our ongoing effort to provide better malware protection, the July 2016 release of the Microsoft Malicious Software Removal Tool (MSRT) includes detection for Win32\/Cerber, a prevalent ransomware family. The inclusion in MSRT complements our Cerber-specific family detections in Windows Defender, and our ransomware-dedicated cloud protection features. We started seeing Cerber in February&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10905,10914,10915,10795,10785,10786,3765,10885,10916,10889],"class_list":["post-6325","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-cerber","tag-cerber-infection-chain","tag-exxroute","tag-locky","tag-microsoft-malicious-software-removal-tool","tag-msrt","tag-ransomware","tag-ransomware-detection","tag-ransomware-mitigation","tag-ransomware-recovery"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6325"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6325\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6325"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}