Ransomware is a type of malware that prevents or limits users from accessing their system. To make the infected system usable again, the victim is forced to pay (a ransom) to a remote threat actor thru certain online payment methods.
Users may encounter this threat through different means. They can either download ransomware unwittingly by visiting malicious or compromised websites. It can also arrive as a payload, either dropped or downloaded by other malware.
It is important to note, however, that paying for the ransom does not guarantee that users can eventually access the infected system.
Once executed in the system, a ransomware can either (1) lock the computer screen or (2) encrypt predetermined files with a password. In the first scenario, a ransomware shows a full-screen image or notification, which prevents victims from using their system. This also shows the instructions on how users can pay for the ransom. The second type of ransomware locks files like documents, spreadsheets and other important files.
Ransomware is considered a “scareware”, as it forces users to pay for a fee (or ransom) by scaring or intimidating them. In this sense, it is similar to the FAKEAV malware, though using a different tactic. Instead of capturing the infected system or encrypting files, FAKEAV coax users into purchasing their bogus antimalware software by showing fake antimalware scanning results.HISTORY
First cases of ransomware infection were seen between the years 2005 – 2006 in Russia. We first reported this incident back in 2006, in which a ransomware variant (detected as TROJ_CRYZIP.A) zipped certain file types and overwrites these, thus leaving only the password-protected zip files in the user’s system. It also created a notepad, which poses as the ransom note to inform users that they can retrieve their files in exchange for $300.
During its initial phase, ransomware were typically files that encrypt particular file types (.DOC, .XL, .DLL, .EXE, just to name a few).
By 2011, we first reported about SMS ransomware threat, in which users with infected systems were asked to dial a premium SMS number. Detected as TROJ_RANSOM.QOWA, this variant also displays a ransomware page repeatedly to users until they finally pay up the ransom via dialing a certain premium number.
To up the ante, we uncovered a ransomware that infects the Master Boot Record (MBR) of a vulnerable system. Bytargeting the MBR, this variant prevents the operating system from loading. To do this, the malware copies the original MBR and overwrites it with its own malicious code. After doing this routine, it automatically restarts the system for the infection to take effect. When the system restarts, the ransomware displays its notification (in Russian).
Ransomware infection was initially limited to Russia. But its popularity and profitable business model soon found its way in other countries across Europe. By March 2012, we have noticed the continuous spread of ransomware infection across Europe (and the United States, Canda). Similar to TROJ_RANSOM.BOV, this slew of ransomware displays a notification page from the victim’s local police agency instead of the typical ransom note (see Reveton, Police Ransomware below).
We also uncovered a different tactic to spread ransomware variants. Certain threat actors compromised a popular French confectionary shop’s website to serve TROJ_RANSOM.BOV. This watering hole-like tactic resulted to widespread infection in France and Japan (where the shop has a significant fan-base). Instead of the usual ransom note, TROJ_RANSOM.BOVdisplays a fake notice from the French police agency Gendarmerie Nationale.
Reveton (also known as Police Ransomware or Police Trojan) is a type of ransomware that impersonates law enforcement agency. These malware typically shows a notification page purportedly from the victim’s local law enforcement agency, informing them that they were caught doing an illegal or malicious activity online.
To know which local enforcement agency is applicable to users, Reveton variants track the geographical location of their victims. Thus, affected users living in the US receive a notification from the FBI, while those located in France are shown with a notice from the Gendarmerie Nationale.
Reveton variants also employ a different payment method in comparison to early ransomware attacks. Once system is infected with Reveton variants, users are prompted to pay through UKash, PaySafeCard, or MoneyPak. These payment methods afford ransomware perpetrators anonymity, as both Ukash and PaySafeCard have faint money trail.
In 2012, we have seen different types of Reveton variants exhibiting new techniques. During the latter part of that year, we reported about variants that play an audio recording using the victim’s native language and another one bearing a fake digital certificate.
The Evolution to CryptoLocker
In late 2013, we saw a new type of ransomware emerge. These ransomware variants now encrypt files, aside from locking the system. This is to ensure that users will still pay up even if the malware itself was deleted. This new type of ransomware was dubbed as “CryptoLocker” due its new behavior. Like previous types of ransomware, these malware demand payment from affected users, this time to unlock their now-encrypted files.
Although the ransom note in CryptoLocker only specifies “RSA-2048” as the encryption used, our analysis shows that the malware uses AES + RSA encryption.
RSA is asymmetric key cryptography, which means it uses two keys. One key is used to encrypt the data and another is used to decrypt the data. (One key is made available to any outside party and is called the public key; the other is kept by the user and is called the private key.) AES uses symmetric keys (i.e., the same key is used to encrypt and decrypt information.)
The malware uses an AES key to encrypt files. The AES key for decryption is written in the files encrypted by the malware. However, this key is encrypted with an RSA public key embedded in the malware, which means that a private key is needed to decrypt it. Unfortunately, the said private key is not available.
Further research revealed that a spam campaign was behind the CryptoLocker infections. The spammed messages contain malicious attachments belonging to TROJ_UPATRE, a malware family characterized by its having small file size and a simple downloading function. It downloads a ZBOT variant which then downloads the CryptoLocker malware.
Near the end of 2013, a new variant of CryptoLocker emerged —with propagation routines. This variant,WORM_CRILOCK.A, can spread via removable drives, a routine unheard of in other CRILOCK variants. This means that the malware can easily spread compared to other variants. This new variant doesn’t rely on downloader malware like CRILOCK to infect systems; rather, it pretends to be an activator for software in peer-to-peer (P2P) file sharing sites. Technical differences have led some researchers to believe this malware is a product of a copycat.
Another file encrypting ransomware soon came into the picture. This malware, known as CryptoDefense or Cryptorbit, like other encrypting ransomware, demands payment for its decryption services. Detected by Trend Micro asTROJ_CRYPTRBIT.H, this variant encrypts database, web, Office, video, images, scripts, text, and other non-binary files. It also deletes backup files to prevent restoration of encrypted files.
The Foray into Cryptocurrency Theft
Ransomware soon began to incorporate yet another element: cryptocurrency (e.g., Bitcoin) theft. We came across two variants of this new malware, called BitCrypt , The first variant, TROJ_CRIBIT.A, appends “.bitcrypt” to any encrypted files and uses an English-only ransom note. The second variant, TROJ_CRIBIT.B , appends “.bitcrypt 2″ and uses a multilingual ransom note, with 10 languages included. CRIBIT variants use the encryption algorithms RSA(426)-AES and RSA(1024)-AES to encrypt the files. This malware also requires that the payment for unlocking files come in the form of Bitcoins.
It was discovered that a variant of the FAREIT information stealing malware, TSPY_FAREIT.BB, downloads TROJ_CRIBIT.B. This FAREIT variant can steal information from various cryptocurrency wallets, including wallet.dat(Bitcoin), electrum.dat (Electrum), and .wallet (MultiBit). These files contain important information such as transaction records, user preferences, and accounts.
POSHCODER: PowerShell Abuse
A new variant of Ransomware and Cryptolocker threats surfaced that leverages the Windows PowerShell feature to encrypt files. Trend Micro detects this as TROJ_POSHCODER.A. Windows PowerShell is a built-in feature in Windows 7 and higher. Cybercriminals often abuse this feature to make threats undetected on the system and/or network.
POSHCODER uses AES in encrypting the files and RSA 4096 public key in encrypting the said AES key. Once all files on the infected system are encrypted, it displays the following image:
Future of Ransomware
In our 2013 Security Predictions, we predicted that conventional threats like ransomware are likely to evolve gradually, as cybercriminals will focus mainly on refining existing tools. This is partly propelled by the ongoing arms race between certain cybercrime groups and security researchers. Because of the positive developments in catching these groups, like the arrests of certain FAKEAV groups and ransomware key figure, we can expect ransomware variants to contain new functionalities and other improvements in terms of stealth mechanism.
Within a couple of years, we have seen ransomware evolved from a threat targeting Russian users into an attack affecting several European and North American countries. With profitable a business model and payment schemes affording anonymity for its perpetrators, we may be seeing more of ransomware in the coming years. Thus, it is crucial for users to know how ransomware works and how to best protect themselves from this threat.
|Trend Micro Detection||Notable Features||Month-Year discovered|
|TROJ_REVETON.IT||Shows a “treaty” between anti-malware companies||12 2012|
|TROJ_REVETON.HM||"Speaks" – verbal read out of the alert. Language is adjusted based on the country setting of the infected computer.||11 2012|