Indeed, they are not all the same (our colleague here who tested first had sent us the samples - grazie ancora
@erreale ). Yes, we tested first with the classics and did ok with CryptoLocker and Locky, as well as other samples (I have a list somewhere - I will share it as soon as I find it). At that point we had had issues with Petya - serious issues, one month before we released the beta. We addressed the issues at that point, thus covering for other similar (MBR attacking) ransomware. Then there are the replacers that caused us some issues with their relatively low fingerprint in terms of file access patterns (they simply read stuff and write stuff to files - no encrypted containers, no delete operations,etc). Those were the last category to be addressed.
The big challenge for us is finding a balance. Our detection engine can be throttled. We can make it more or less aggressive when asserting process/program activity. However there needs to be a balance so that we avoid false positives. More aggressive settings start to backfire when certain legitimate backup / updating applications do their jobs.
I think it makes sense to use classic samples for tests because of the following reasons:
- nowadays you can rent ransomware-as-a-service and deliver your own attack. For 60 bucks or sometimes even for free (but for a % off the ransom) you simply go to a web page, select your sample, packaging, obfuscation code and run your own phishing campaign. Most those are still based on classic samples, although for some versions there are decryption tools available. So we are going to see such attacks still, and prevention is a better option than recovery
- the classics define several categories of ransomware so these make up a good starting point;
Bon apetit! Perhaps you can share the recipe.