The Day We Infected Ourselves with Ransomware

35
RANSOMWARE 5/24/2017

Transcript of The Day We Infected Ourselves with Ransomware

Page 1: The Day We Infected Ourselves with Ransomware

RANSOMWARE

5/24/2017

Page 2: The Day We Infected Ourselves with Ransomware

Who We AreRIIS is a boutique IT firm focused on joining business

and technology through Custom Mobile , Software

Development and Premium IT Professional Services

Page 3: The Day We Infected Ourselves with Ransomware

Mobile Apps Web Dev Professional Services Security Audits User Experience

Our Specialties

Page 4: The Day We Infected Ourselves with Ransomware

Agenda

• Wanna Cry

• What is Ransomware?

• Different Flavors

• Test Lab Setup

• Fixes

• Preparation Plan

• Call to Action

Page 5: The Day We Infected Ourselves with Ransomware

Wanna Cry

Page 6: The Day We Infected Ourselves with Ransomware

Wanna Cry

Page 7: The Day We Infected Ourselves with Ransomware

Ransomware

News

Trust but VerifyDon’t believe the HypeHard to decipher the signal from the noise

Page 8: The Day We Infected Ourselves with Ransomware

What is Ransomware

Deployment

Page 9: The Day We Infected Ourselves with Ransomware

What is

Ransomware

• Deployment

Page 10: The Day We Infected Ourselves with Ransomware

What is Ransomware

Installation

Page 11: The Day We Infected Ourselves with Ransomware

What is

Ransomware

• Installation

Page 12: The Day We Infected Ourselves with Ransomware

What is Ransomware

Command and Control

Page 13: The Day We Infected Ourselves with Ransomware

What is Ransomware

Destruction

Page 14: The Day We Infected Ourselves with Ransomware

What is Ransomware

Extortion

Page 15: The Day We Infected Ourselves with Ransomware

What is Ransomware

Targets

• Hospitals

• Fortune 500

• Universities and Schools

• Police Stations

• Religious Organizations

Page 16: The Day We Infected Ourselves with Ransomware

What is Ransomware

Flavors

• Locky

• Cryptowall

• CryptXXX

• Jigsaw

• TeslaCrypt

• Petra

• Win32Dircrypt

Page 17: The Day We Infected Ourselves with Ransomware

What is

Ransomware

• Ransomware as a service

Page 18: The Day We Infected Ourselves with Ransomware

Test Lab

Setup

• Wipe machines

• Install fresh copy of Windows 7

• Use dedicated wifi hotspot of test phone

• Download Ransomware from the Zoo

• https://github.com/ytisf/theZoo

• Choose your flavor and install

Page 19: The Day We Infected Ourselves with Ransomware

Test Lab

Setup

Page 20: The Day We Infected Ourselves with Ransomware

Test Lab

Warning

Do not do this on a machine you ever want

to use again. Make sure it is not connected

to your company wifi.

Page 21: The Day We Infected Ourselves with Ransomware

Test Lab

Page 22: The Day We Infected Ourselves with Ransomware

Fixes

Jigsaw

Page 23: The Day We Infected Ourselves with Ransomware

Fixes

Jigsaw

Page 24: The Day We Infected Ourselves with Ransomware

Fixes

Jigsaw

Page 25: The Day We Infected Ourselves with Ransomware

Fixes

TeslaCrypt

Page 26: The Day We Infected Ourselves with Ransomware

Fixes

TeslaCrypt

Page 27: The Day We Infected Ourselves with Ransomware

Fixes

TeslaCrypt

Page 28: The Day We Infected Ourselves with Ransomware

Ransomware Prep Plan

• Backup your data and keep a copy offsite.

• Disconnect from all cloud backup services such as Dropbox.

• Use Antivirus, Firewalls and Email scanners.

• Update your OS when a new patch appears.

• Use Microsoft’s shadow drives (VSS) or Mac’s Time Machine.

• Uninstall Flash.

• Remove or restrict Admin access.

• Disconnect any shared drives.

• Train your staff, send them test phishing emails

• Use a test lab and see if you can recover from a simulated attack.

• Sign up for a Bitcoin account in case you need to pay!

Page 29: The Day We Infected Ourselves with Ransomware

Prep Plan

• Test Phishing Emails

Page 30: The Day We Infected Ourselves with Ransomware

Ransomware Potential Breakpoints

The ransomware must execute and unpack itself and then collect system information.

The ransomware has to change registry settings to maintain persistence.

More advanced ransomware disables system restore and deletes everything in the Volume Shadow Copy (VSC).

Most, but not all, ransomware has to call out to command-and-control infrastructure to get a public key that will be used to encrypt the files.

The ransomware now has to enumerate the files.

It then begins to read and encrypt the files.

If each encrypted file is written to a new file, the original files must be deleted.

Finally, the encryption key is removed from the local machine and sent back to the controller.

Page 31: The Day We Infected Ourselves with Ransomware

Bitcoin

Page 32: The Day We Infected Ourselves with Ransomware

Resources

http://riis.com/blog

https://www.knowbe4.com/phishing-security-test-offer

https://github.com/ytisf/theZoo

https://www.bleepingcomputer.com/download/jigsaw-decrypter/dl/321/

http://www.talosintelligence.com/teslacrypt_tool/

https://noransom.kaspersky.com/

https://www.ghacks.net/2016/03/30/anti-ransomware-overview/

Page 33: The Day We Infected Ourselves with Ransomware

Call(s) to Action

• Set up a Test Lab

• Run a Ransomware drill

Page 34: The Day We Infected Ourselves with Ransomware

Mobile App Partners

Page 35: The Day We Infected Ourselves with Ransomware

Contact us!

riis.com

248.351.1200

1250 Stephenson Hwy, Troy, MI 48083