{"id":20453,"date":"2017-01-05T06:30:46","date_gmt":"2017-01-05T13:30:46","guid":{"rendered":"https://www.webroot.com/blog/?p=20453"},"modified":"2018-01-30T12:23:14","modified_gmt":"2018-01-30T19:23:14","slug":"four-rising-stars-ransomware-stage","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/01\/05\/four-rising-stars-ransomware-stage\/","title":{"rendered":"Four Rising Stars on the Ransomware Stage"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>By now, everybody has probably heard of CryptoLocker. It makes sense that CryptoLocker would get a fair amount of media attention, since it\u2019s been involved in several high-profile hacks, but there are a number of other players on the ransomware stage that deserve a place of distinction among the list of players. Managed service providers (MSPs) like you know the value of staying up to date on the variety of different types of threats\u2014in addition to their individual stats and characteristics\u2014to keep clients safe.<\/p>\n<h5><\/h5>\n<h5><strong>Cast of\u00a0Ransomare Players<\/strong><\/h5>\n<ol>\n<li>\n<h6><strong>CryptoWall 4.0\u00a0<\/strong><\/h6>\n<p>A bit like the Barrymores, the Sheens, the Coppolas, (the Kardashians?), the CryptoWall family gets more media coverage with every generation. Following in the family tradition, CryptoWall 4.0 uses phishing emails for distribution. This is hardly a surprise, since phishing is still the single most effective way to drop a malware payload. But CryptoWall 4.0 marches to the beat of its own drum; not only are the victim\u2019s files encrypted, this ransomware randomizes the filenames so the victim can no longer tell which file is which. By fanning the flames to create confusion around how much file damage there actually is, the new CryptoWall increases its chances that victims will pay up.<\/p>\n<p>Additionally, CryptoWall 4.0 includes a free decrypt video to convince victims that the decryption steps they need\u00a0to get their files back is effortless, and that handing over the ransom will get them their files back.<\/p>\n<ul>\n<li>Phishing email attachment is source of payload<\/li>\n<li>Randomizes victim\u2019s filenames to create confusion<\/li>\n<li>Offers free decrypt demo to add credibility<\/li>\n<\/ul>\n<\/li>\n<li>\n<h6><strong>PadCrypt\u00a0<\/strong><\/h6>\n<p>Rather than hiding out and concealing its plans, what makes PadCrypt different from its contemporaries is its willingness to interact with the public. Embedded into the \u201cproduct\u201d, PadCrypt includes a chat interface. The ransom process of setting up a Bitcoin wallet, filling it with bitcoins, and sending payment can be complicated. By offering this chat feature, PadCrypt lends a more human support element to the ransomware process, providing so-called support to its victims. (How sweet!)<\/p>\n<ul>\n<li>First ransomware with chat support<\/li>\n<li>Communicates via Darknet to avoid being traced<\/li>\n<li>\u201cHelps\u201d even less savvy victims pay up<\/li>\n<\/ul>\n<\/li>\n<li>\n<h6><strong>TeslaCrypt\u00a0<\/strong><\/h6>\n<p>Because it targeted gamers specifically and encrypted the files they need for their games, TeslaCrypt is more of what you\u2019d call a cult fave. The files it takes hostage included saves, mods, and profiles. But since TeslaCrypt was being sold by non-authors on the Darknet, the original authors leaked the master decryption key to the public to permanently diffuse the threat. While it\u2019s laying low for now, we wouldn\u2019t be surprised if TeslaCrypt showed up again next season.<\/p>\n<ul>\n<li>Accounted for ~11% of distributed ransomware<\/li>\n<li>Attacked over 200 extensions on newer variants<\/li>\n<li>Targeted gamers (Valve, Bethesda, Unreal Engine files)<\/li>\n<li>Circumvented 3rd party defense to deliver polymorphic payloads at root level<\/li>\n<\/ul>\n<\/li>\n<li>\n<h6><strong><b>RaaS (Ransomware-as-a-Service)\u00a0<\/b><\/strong><\/h6>\n<p>Not an actor, per se, but RaaS is more like a local theater company that encourages audience participation. Created for criminals by criminals, it opens up the ransomware stage to hackers of all skill levels. Thanks to RaaS, almost anyone can distribute encrypting ransomware payloads of their own design. In return, hackers pay for the service by sharing a cut of their spoils with the original author.<\/p>\n<ul>\n<li>Enables almost anyone to make ransomware<\/li>\n<li>Portal for malware generation is exclusively in Darknet (typically invite-only)<\/li>\n<li>Intended for less-skilled cybercriminals who rent botnets<\/li>\n<li>The malware author who created the portal takes a commission<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h5>\u00a0<strong>Conclusion<\/strong><\/h5>\n<p>Even though the number of ransomware stars keeps growing, and their methods keep getting more diverse and advanced, managed service providers (MSPs) can take steps to maximize defense and help clients stay ahead. Keeping yourself and your customers in the know about the latest tactics and types of exploits favored by today\u2019s ransomware is vital\u2014as well as putting together an all-star cast with next-generation endpoint protection that utilizes collective threat intelligence to proactively protect against the rising stars of malware.<\/p>\n<p><strong><b>Next Steps:<\/b><\/strong>\u00a0Want to find out if Webroot has what it takes to protect your customers? See for yourself with a no-risk\u00a0<a href=\"https:\/\/www.webroot.com\/us\/en\/business\/trials\/global-site-manager?sc=701F0000000vAsSIAU&amp;ls=2\">FREE trial<\/a>. You don\u2019t even have to uninstall existing security.\u00a0Want to learn more about how Webroot partners with MSPs to delight customers, lower costs, and boost profits?\u00a0<a href=\"https:\/\/na10.salesforce.com\/701F0000000vAsR\">Learn more<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; By now, everybody has probably heard of CryptoLocker. It makes sense that CryptoLocker would get a fair amount of media attention, since it\u2019s been involved in several high-profile hacks, but there are a number of other players on the ransomware stage that deserve a place of distinction among the list of players. Managed service [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":20479,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3987,3977,3985,3967,3483,3979,3477,3971,3963,3961,3991,3975,3937,3969,3973,3965,5207,3981,5205,3989],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20453"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=20453"}],"version-history":[{"count":16,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20453\/revisions"}],"predecessor-version":[{"id":20547,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20453\/revisions\/20547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/20479"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=20453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=20453"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=20453"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=20453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}