Imagining The Ransomware Of The Future

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,152
Ransomware that can encrypt and lock 800 of your organization's servers, 3,200 workstations, and the vast majority of your data...in one hour flat. That's the nightmare that researchers at Cisco Talos Labs described in a report today: a self-propagating, stealthy, modular ransomware that can move laterally across internal networks and cross air-gapped systems.

In addition to the standard core ransomware functionality, Cisco Talos' hypothesized "King's Ransom framework" has a variety of modules for both stealth and propagation.
To avoid detection, "king's ransom" would have a rate limiter module -- to prevent the code from eating up too many system resources and therefore attracting the user's unwanted attention. In this framework, the ransomware would also eschew the traditional command-and-control infrastructure; it would instead transmit a beacon, containing global unique IDs (GUIDs), to a C2 domain via common protocols like HTTP or DNS. This domain could then collect these GUIDs, and use them to monitor and manage stats about infection rates.

The framework would contain modules for propagating through a variety of vectors. With a file infector module, the ransomware would attempt to add itself to other executables already residing on the infected system, which would both help the code spread and re-infect the system if it's somehow ejected. With a USB mass-storage propagator, the ransomware would copy itself to mapped drives, and be configured to automatically connect and run; it could thus cross air-gapped systems. Authentication infrastructure exploits would enable the attacker to gain admin privileges to a variety of systems and domains. An RFC 1918 target address-limiter would be used to attack targets using RFC addresses -- used by internal networks, as opposed to Internet-wide.

In the devastating scenario Cisco proposes, the ransomware takes over up to 800 servers, 3,200 workstations, half the digital assets and the "vast majority" of data in an organization within the first hour of infection. The attackers request a $1 million ransom, which will automatically increase to $3 million eight days later.

Will organizations pay such a steep price, even after such an extensive infection? Cisco Talos Labs says that depends upon a number of factors, such as the value of the data they cannot access and their ability to restore that data. Do they have sufficient off-site backups that were not affected? Can they do manual restoration of data, and if so, how much will that cost, in comparison to the cost of the ransom? Although it's just theory now, the quickly increasing sophistication of ransomware makes it all too believable.

ps- the Talos report here: Cisco Talos Blog: Ransomware: Past, Present, and Future
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
The contribution of recycled symptoms combined with deadly effects makes the ransomware powerful in such nasty way, where even a disinfectant tool can be useless due to severity level.

Additionally O.S that are out of date or not regularly updating the patches contribute for rapid percentage of incidents.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top