India amongst the top 10 countries susceptible to SAMSAM
By MYBRANDBOOK
Sophos has released an in-depth investigative white paper on the SamSam ransomware attacks that first appeared in December 2015. Titled “SamSam: The (Almost) Six Million Dollar Ransomware”, this white paper aims to provide a comprehensive understanding of this unique ransomware attack by summarizing key findings about attacker’s tools, techniques, and protocols.
SamSam is a thorough encryption tool, rendering not only work data files unusable but any program that is not essential to the operation of a Windows computer, most of which are not routinely backed up. SamSam’s attacking method unique as it is manual and as a result, attackers can employ countermeasures (if needed) to evade many security tools. If the process of encrypting data is interrupted, the malware is capable of comprehensively erasing all trace of itself immediately, hindering any investigation. Furthermore, recovery from the attack may require reimaging and/or reinstalling software as well as restoring backups. As a result, many victims were not able to recover sufficiently or quickly enough to ensure business continuity, and had to pay the ransom.
Peter Mackenzie, Global Malware Escalations Manager, Sophos, says, “Most ransomware is spread in large, noisy and untargeted spam campaigns using simple techniques to infect victims and demand relatively small sums in ransom. What sets SamSam apart is that it’s a targeted attack tailored to cause maximum damage and ransom demands are measured in tens of thousands of dollars. The attack method is surprisingly manual, and more cat burglar than smash-and-grab. As a result, the attacker can employ countermeasures to evade security tools and if interrupted can delete all trace of itself immediately, to hinder investigation.”
SamSam’s relentless attack methodology combined with the growth in Ransomware-as-a-Service and the anticipation of the ever-evolving threat landscape, emphasizes the need for a layered and synchronized cybersecurity approach for businesses of all sizes.
Intrusions from exploits have been persistent and are still a prominent threat to businesses and often go undetected for months. Once inside a system, cybercriminals use complex malware that can hide in memory or camouflage itself. In many cases, businesses do not know they’ve been breached until someone finds a large cache of stolen data on the Dark Web.
Sophos recommends the following top four security measures:
* Restrict access to port 3389 (RDP) by only allowing staff who use a VPN to be able to remotely access any systems. Utilize multi-factor authentication for VPN access
* Complete regular vulnerability scans and penetration tests across the network; if you have not followed through on recent pen-testing reports, do it now
* Activate multi-factor authentication for sensitive internal systems, even for employees on the LAN or VPN
* Create backups that are offline and offsite, and develop a disaster recovery plan that covers the restoration of data and whole systems
Nazara and ONDC set to transform in-game monetization with ‘
Nazara Technologies has teamed up with the Open Network for Digital Comme...
Jio Platforms and NICSI to offer cloud services to government
In a collaborative initiative, the National Informatics Centre Services In...
BSNL awards ₹5,000 Cr Project to RVNL-Led Consortium
A syndicate led by Rail Vikas Nigam Limited (abbreviated as RVNL), along wi...
Pinterest tracks users without consent, alleges complaint
A recent complaint alleges that Pinterest, the popular image-sharing platf...
BEETEL TELETECH LTD.
ACER INDIA PVT. LTD.
DRUVA SOFTWARE PVT. LTD.
TALLY SOLUTIONS PVT. LTD.
Icons Of India : Dilip Asbe
At present, Dilip Asbe is heading National Payments Corporation of Ind...
Icons Of India : NATARAJAN CHANDRASEKARAN
Natarajan Chandrasekaran (Chandra) is the Chairman of Tata Sons, the h...
Icons Of India : Daisy Chittilapilly
Daisy Chittilapilly is the President of Cisco’s India and SAARC regi...
IOCL - Indian Oil Corporation Ltd.
IOCL is India’s largest oil refining and marketing company ...
IREDA - Indian Renewable Energy Development Agency Limited
IREDA is a specialized financial institution in India that facilitates...
LIC - Life Insurance Corporation of India
LIC is the largest state-owned life insurance company in India...
Indian Tech Talent Excelling The Tech World - Vinod Dham, Founder & Executive Managing Partner, IndoUS Venture Partners
Vinod Dham, known as the “Father of the Pentium Chip,” has left an...
Indian Tech Talent Excelling The Tech World - Aman Bhutani, CEO, GoDaddy
Aman Bhutani, the self-taught techie and CEO of GoDaddy, oversees a co...
Indian Tech Talent Excelling The Tech World - NIKESH ARORA, Chairman CEO - Palo Alto Networks
Nikesh Arora, the Chairman and CEO of Palo Alto Networks, is steering ...