Social-Engineer Newsletter Vol 07 – Issue 93

 

Vol 07 Issue 93
June 2017

In This Issue

  • Ransomware and The Psychology Behind Why It Works
  • Social-Engineer News
  • Upcoming classes

As a member of the newsletter you have the option to OPT-IN for special offers. You can click here to do that.


Check out the schedule of upcoming training on Social-Engineer.com

2017 Schedule

If you want to ensure your spot on the list register now – Classes are filling up fast and early!


Sign ups for the SECTF4Kids and the brand new SECTF4Teens is now live! Enroll your kids now and we’ll see them in the SEVillage.

The SE Village at DEF CON 25 and its events wouldn’t be possible without some amazing sponsors!

SECTF Sponsors

SECTF4Kids and SECTF4Teens Sponsors


Do you like FREE Stuff?

How about the first chapter of ALL OF Chris Hadnagy’s Best Selling Books

If you do, you can register to get the first chapter completely free just go over to http://www.social-engineer.com to download now!


To contribute your ideas or writing send an email to contribute@social-engineer.org


If you want to listen to our past podcasts hit up our Podcasts Page and download the latest episodes.


Our good friends at CSI Tech just put their RAM ANALYSIS COURSE ONLINE – FINALLY.

The course is designed for Hi-Tech Crime Units and other digital investigators who want to leverage RAM to acquire evidence or intelligence which may be difficult or even impossible to acquire from disk. The course does not focus on the complex structures and technology behind how RAM works but rather how an investigator can extract what they need for an investigation quickly and simply.

Interested in this course? Enter the code SEORG and get an amazing 15% off!
http://www.csitech.co.uk/training/online-ram-analysis-for-investigators/


The team at Social-Engineer, LLC proud uses:


A Special Thanks to:

The EFF for supporting freedom of speech

Keep Up With Us

Friend on Facebook Facebook
Follow on Twitter Twitter

Ransomware and The Psychology Behind Why It Works

May 12th, 2017, ransomware really got put on the map, with WannaCry (WanaCrypt0r 2.0) encrypting over 200,000 systems in 150 countries. The demand: $300 (US) worth of Bitcoin to decrypt your data. Who was hit: 61 National Health Service organizations in the UK, Nissan, FedEx, telecom and gas companies in Spain, some Renault factories in France, the interior ministry in Russia, Germany’s rail network, and the list goes on.

How did this happen and why does this form of attack work so well?

Ransomware isn’t new. It first appeared way back in 1989, as PC Cyborg (AIDS) Trojan. (It wasn’t a money maker but it does go down in the history books.) Throughout the years, ransomware has appeared in various forms, such as Cerber, CryptoLocker, Locky, TeslaCrypt, TorrentLocker and many others. All had the same goal; find a way to infiltrate the system,

lockup the system or encrypt all the files and demand payment to unlock the system or decrypt the files.

Because of the growth of the Internet and the ease of transferring funds, especially with the hard (sometimes impossible) to trace cryptocurrency, and the quick and easy return on investment, this form of malware is becoming more popular. This has become a $1 billion dollar industry, according to CSO. Then you combine them with the use of exploits (many now provided by the NSA leak) and you have the perfect weapon to use against unsuspecting users. That is what happened with WannaCry; it used the EternalBlue exploit that was used against MS17-010, a vulnerability in the MS SMB protocol. It then propagated on its own to other systems in the same network that had this vulnerability.

How does ransomware get into the system in the first place?

Let The Mind Games Begin

Simple – the target gets a specially crafted email, like a spear-phish or a targeted email for their particular job category. They click on a link that directs them to a specially crafted site that automatically downloads the malware or they open a document in the email and it installs from there. Another means can be by clicking on an infected advertisement or visiting an infected website.

As an example, back in January, I received a phone call from a friend. She was in a panic; she said she opened an email that had an invoice attached, she clicked to open it and then this message popped up:

What made her decide to click on the attachment? At the time, she was working on invoices for the company she works for and not noticing that it wasn’t someone she usually gets invoices from, she clicked to open it.

This brings us to why ransomware works so well. In Barkly’s blog Troy Hunt says it well, “Attackers are really figuring out how to tap into not just the digital side of things to compromise systems, but how to tap into people’s psyches and push the right buttons that will cause them to pay.”

What are those buttons? Here are some of the mind tricks they use to be successful:

It starts with the email; the potential victim receives an email addressed to them. It’s personalized, the wording and message is something that they would normally see. Since it looks legitimate they click on the link or attachment, like an invoice or fax, and open it. What the attacker is doing is to quickly build trust and to override the target’s ability to critically think and to make them react based on emotion (how often do we make good decisions based on emotion???).

This is what happened to my friend. She was very busy with work, processing invoices, an email comes in that looks legitimate and has an invoice attached to it. So, she opens it without thinking.

Another example of how attackers are doing this involved the spread of the ransomware called Philadelphia that affected health organizations. According to Healthcare IT News, employees received a spear-phishing email. Instead of a traditional attached file, users were directed to a link found in the email. Once clicked, the site redirected and downloaded a malicious Microsoft Word file. The document contained the logo of the targeted healthcare organization and a signature from a medical practitioner from that organization. In addition, the file contained icons resembling patient information. All this made the whole pretext look legitimate and compromised the victims’ critical thinking.

Another trick to watch out for are websites we visit. According to the site FBI.gov/news, FBI Cyber Division Assistant Director James Trainor is quoted, “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.” So, watch out for compromised adds or websites.
After the ransomware takes over, the mind games continue.

You know those sales adds where they say the sale will only last for one day and if you don’t act now you will lose out? Well, the attackers use the same ploy, to instill a sense of urgency and cause you to bypass all critical and rational thinking and to react with your emotions. They display a clock or timer ticking away, with the threat that if the ransom is not paid in a certain amount of time, some files will get deleted or the price is going up.

Another button they press is the threat of public disclosure. They use this to instill fear that information that was captured will be released if they don’t receive payment. This threat of using defamation and extortion is very effective, especially to healthcare organizations with the possible disclosure of sensitive patient information, such as PII and medical records.

How can organizations and individuals keep from falling prey to the mind games that the attackers are using?

Minimize The Risk

The following 4 points should help:

1. Training and Education:

Businesses should train their employees how to recognize phishing emails and inform them of the critical role they play in protecting their organizations data. Don’t just take my word for it. N’Gai Oliveras, IT director at the Office of the Comptroller of Puerto Rico, is quoted in the TechRepublic article where he recommends increasing training for end users as one solution. He says, “In these times, we in senior management need to be more focused on providing more security awareness trainings to our users, instead of looking for more ways to strengthen our networks,” he said. “In my opinion, our users are the most effective line of defense in our networks.” In the same article Chuck Elliott, VP and CIO of Concord University said, “We should all be highly motivated to continue minimizing threats and intrusions, and increase our efforts to educate users of our networks.” So, IT professionals are agreeing that education is one of the main keys to combat the mind games and keep ransomware from getting into the network.

2. Policies:

Organizations need to implement software restriction policies that help prevent malware from running. A computer use policy is also needed; don’t give users admin privileges. Configure access controls, including file, directory, and network share permissions appropriately. If users only need read rights to specific information, then don’t give them write-access to those files or directories.

3. Protection:

In addition to endpoint and server based A/V scanners, organizations need to implement runtime malware defenses to stop the ransomware that gets past antivirus. Identify vulnerable systems using scanning tools like Nessus, and patch these vulnerable systems and upgrade any deprecated OS as soon as possible. Only have ports open you absolutely need and perform a regular audit of them. Implement an email gateway with machine-learning function and real-time IP reputation scanning. For the best results, look for a security solution with email attachment scanning, performed in the cloud via static and dynamic (sandbox) malware analysis, so email attachments are checked for bad behavior before they’re delivered, and not just known bad reputation or known signatures which tend to miss zero-day attacks. For those unaware, make sure Macros are disabled for documents.

4. Business Continuity Plan:

All need to have a proper backup and recovery strategy in place and test it regularly. The 3-2-1 approach works well if your organization can do it. For those unfamiliar with it, it’s having 3 copies in 2 different formats and one copy stored offsite. Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up. (Test your backups and make sure they are good, you don’t want to be in recovery mode and your back up is no good.)

What if you already got compromised, should you pay? What do you do?

Do I Really Want To Be a Cash Cow?

If you think you or your organization have been the victim of ransomware you can report it:

Should you pay the ransom? According to the message from the UK’s National Crime Agency they say, “do not pay! – there is no guarantee that systems will be restored.”

The only thing left to do is restore what you can from backup and learn from what happened.

So, if you have been infected or not, learn to not fall for the mind games that attackers use. Learn from these events and follow the 4 points mentioned to make your environment more secure. Educate and train yourself and fellow employees to recognize phishing emails, implement policies that will secure the network, protect the network with a layered approach and have a proper business continuity plan in place and regularly tested. Doing this will not be a 100% guarantee that the network won’t be compromised but it sure will reduce the risk, and that’s what matters.

Stay safe.

Written By: Mike Hadnagy

Resources:
http://money.cnn.com/2017/05/15/technology/ransomware-wannacry-explainer/ https://www.datto.com/blog/common-types-of-ransomware
https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/why-ransomware-works-psychology-and-methods-to-distribute-infect-and-extort http://www.securityfocus.com/advisories/700
http://www.csoonline.com/article/3154714/security/ransomware-took-in-1-billion-in-2016-improved-defenses-may-not-be-enough-to-stem-the-tide.html
https://blog.barkly.com/ransomware-scare-tactics-mind-games http://www.healthcareitnews.com/news/new-ransomware-spotted-targeting-healthcare-industry
https://www.fbi.gov/news/stories/incidents-of-ransomware-on-the-rise http://www.techrepublic.com/article/cybersecurity-two-thirds-of-cios-say-threats-increasing-cite-growth-of-ransomware


 

 

The post Social-Engineer Newsletter Vol 07 – Issue 93 appeared first on Security Through Education.

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by SEORG. Read the original post at: https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-93/