Connect with us

GRTech

Sophos whitepaper reveals SamSam Ransomware has raked in almost $6m

Published

on

Ransomware is universal and one of the greatest threats in cybersecurity currently. Extensive research by Sophos has uncovered a trove of new information on the notorious SamSam ransomware that has affected far more victims than previously thought, and raised vastly more in ransom demands – almost $6 million.

Most ransomware is spread in large, noisy and untargeted spam campaigns sent to thousands, or even hundreds of thousands, of people. They use simple techniques to infect victims and aim to raise money through large numbers of relatively small ransoms of perhaps a few hundred dollars each.

What sets SamSam apart from most other ransomware is that its use in targeted attacks by a skilled team or individual, who breaks into a victim’s network, surveils it and then runs the malware manually.

The attacks are tailored to cause maximum damage and ransom demands are measured in the tens of thousands of dollars.

The attack method is surprisingly manual, and more cat burglar than smash-and-grab. As a result, the attacker can employ countermeasures (if needed), and is surprisingly adept at evading many security tools. If the process of encrypting data is interrupted, then the malware comprehensively deletes all trace of itself immediately, to hinder investigation.

SamSam is a particularly thorough encryption tool, rendering not only work data files unusable but any program that isn’t essential to the operation of a Windows computer, most of which are not routinely backed up. Recovery may require reimaging and/or reinstalling software as well as restoring backups. The attacker is very good at covering their tracks and appears to be growing increasingly paranoid (or experienced) as time passes, gradually adding more security features into his tools and websites.

Key findings

The basics

  • The SamSam ransomware first appeared in the wild in December, 2015
  • Some victims reported a widespread ransomware event that significantly impacted operations of some large organizations, including hospitals, schools and cities
  • The attack details took some time to obtain because the attacker(s) responsible took great care to obfuscate their methods and delete any evidence that could be revealing
  • Many victims found that they could not recover sufficiently or quickly enough to ensure business continuity on their own, and reluctantly paid the ransom

The statistics

  • By tracking Bitcoin addresses supplied on ransom notes and sample files and by working with the firm Neutrino, Sophos has calculated that SamSam has earned its creator(s) more than US$5.9 million since late, 2015
  • Sophos has determined that 74% of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the UK, and the Middle East
  • The SamSam attacker has received ransom payments as high as $64,000, based on analysis of ransom payments to the Bitcoin wallets tracked
  • Unlike most other ransomware, SamSam encrypts not only document files, images, and other personal or work data, but also configuration and data files required to run applications (e.g., Microsoft Office). Victims whose backup strategy only protects the user’s documents and files won’t be able to recover a machine without reimaging it, first
  • Every subsequent attack shows a progression in sophistication and an increasing awareness of how to evade operational security
  • The cost victims are charged in ransom has increased dramatically, and the tempo of attacks shows no sign of slowdown

The balance sheet

  • Sophos estimates that the SamSam attacker earned an average of a hair under US$300,000* per month in 2018
  • From tracking Bitcoin payments made to known wallet addresses owned by the attacker, Sophos has calculated the SamSam take as exceeding US$5.9 million*
  • The largest single ransom received by the SamSam attacker was valued at $64,478* (at the time of payment)
  • Payment is made by victims in bitcoin via a custom “payment site” on the dark web that is at a unique address for each victim organization
  • The payment site lets the SamSam attacker interact directly with victims, who use a message board-like interface to communicate
  • The ransom amount varies widely by the organization, but has steadily increased over the time the ransomware has been in active use
  • After full payment has been received, the SamSam attacker moves the cryptocurrency into a system of tumblers and mixers which attempt to launder the source of the Bitcoin through myriad micro transactions

* Note: In order to accurately estimate costs, due to wildly fluctuating exchange rates, we calculate the value of a given quantity of Bitcoin as its worth on the day it was acquired by the SamSam attacker, if the SamSam attacker were immediately to cash it out

Recommended security practices

  • There is no silver bullet to security; an active and layered security model is the best practice
  • If you study the methodology, there are several points at which basic security measures can stop the SamSam attacker
  • Sophos recommends implementing these top four security practices right now:
    1. Restricted access to port 3389 (RDP) by only allowing staff who use a VPN to be able to remotely access any systems. Utilize multi-factor authentication for VPN access
    2. Complete, regular vulnerability scans and penetration tests across the network; if you haven’t followed through on recent pen-testing reports, do it now
    3. Multi-factor authentication for sensitive internal systems, even for employees on the LAN or VPN
    4. Create back-ups that are offline and offsite and develop a disaster recovery plan that covers the restoration of data and whole systems
  • Additional best security practices Sophos recommends are:
    • Layered security that blocks attackers from all points of entry and from gaining access once inside a network
    • Rigorous and diligent patching
    • Server-specific security with Lockdown capabilities and anti-exploit protection, especially for unpatched systems
    • Security that synchronizes and shares intelligence to activate lockdowns
    • Endpoint and server security with credential theft protection
    • Hard to crack and unique IT admin passwords with multi-factor authentication
    • Improve password policies: Encourage employees to use secure password managers, longer passphrases and the non-reuse of passwords for multiple accounts – How to pick a proper password.
    • Periodic assessments, using third party tools like Censys or Shodan, to identify publicly-accessible services and ports across your public-facing IP address space, then close them
    • Improved account access controls: Enact sensible policies to secure idle accounts; automatically lock accounts and alert IT staff after a number of failed login attempts
    • Regular phishing tests and staff education about the perils of phishing

For additional information on SamSam Ransomware please visit – https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/SamSam-The-Almost-Six-Million-Dollar-Ransomware.pdf

Source: TechEconomy.ng

GrassRoots.ng is on a critical mission; to objectively and honestly represent the voice of ‘grassrooters’ in International, Federal, State and Local Government fora; heralding the achievements of political and other leaders and investors alike, without discrimination. This daily, digital news publication platform serves as the leading source of up-to-date information on how people and events reflect on the global community. The pragmatic articles reflect on the life of the community people, covering news/current affairs, business, technology, culture and fashion, entertainment, sports, State, National and International issues that directly impact the locals.

Continue Reading

GRTech

The Economics of Product Decisions: Applying Behavioural Economics and Game Theory in PM

Published

on

Amarachi Nnochiri
Amarachi Nnochiri

Product managers often need to make a clear-cut decision: what should we build next? But the decisions which hold real importance go beyond adding features.

It’s about getting what makes people tick.

It goes way beyond what you would expect, getting into how people behave and using game theory.

These areas give insight into how users decide and how a product’s design can improve growth and keep people interested.

This is what Amarachi Nnochiri excels at. She is a senior product manager that knows how to use economics and psychology in her job.

She goes beyond simply managing product tasks; she develops whole product systems based on how users think, feel, and use a service. Her background shows how understanding human psychology and behaviour can give you a significant advantage in the competition.

One idea Amarachi uses is  “loss aversion.” In this scenario, people feel worse about losing something than they feel good about gaining something of equal value.

She uses this when designing her products, mostly when it comes to pricing and getting people to try new strategies. For example, instead of giving a free trial, she might use a freemium setup where users get some stuff for free but could lose it if they don’t buy an upgrade. This pushes them to pay.

She might also use progress bars or streak counters, since losing progress gets people to keep using the product.

Amarachi also uses ideas from “game theory” to get how users act and change their behavior. She realizes that users are doing more than operating a product, but are playing a game with other users or with the product itself. She designs things that use ideas like “Nash equilibrium,” where nobody can do better by changing what they’re doing. For a social product, this could mean creating a system where doing something good for yourself (like inviting friends) also helps everyone else. This makes the whole thing stable and positive.

Her know-how in game theory also applies to making strong “network effects.” This means making stuff that gets better as more people use it.

A good example is a social network where each new user makes the product more helpful for everyone else. Amarachi endeavours to make things go viral on purpose, not just by luck.

She might use “commitment devices,” which are things that make a user stick with a behaviour by making them depend on it socially or functionally. For example, inviting team members to a tool makes the user stick with the platform and makes the product’s network stronger.

This way of thinking is better than just following the usual steps. By using these economic and psychological tricks, Amarachi develops competitive advantages which are difficult to replicate.

She knows that a company’s best thing is not just a simple interface, but a product that’s designed to sync with how people behave.

Her product choices aren’t just about the needs of users, but equally focus on motivating them to like the product, use it, and stick with it.

In her work, choosing a subscription price isn’t just a business thing; it’s about behaviour. Designing a social feed isn’t just about the content; it’s about balancing what people want and watching how they interact. Amarachi knows extensively about the economics of product decisions. This makes her products innovative and appealing to human behaviour, which leads to more use, keeps people around, and helps the product grow. She’s a leader in product management, where identifying customer desires is backed by understanding human motivation.

Continue Reading

GRTech

Glo reduces international call rates 

By Sandra Ani

Published

on

Glo and Globacom


Technology Company, Globacom, has announced significant reductions in its International Direct Dialing (IDD) rates, making international calls more affordable for its existing and new customers across Nigeria.

Effective August 10, the new rates began applying to over 15 popular international destinations, including United States which will has moved to ₦30 per minute, down from ₦35, United Kingdom is now N350 from ₦400, while India also moved down to ₦40 from N45.

The rates for China, Saudi Arabia and Cameroon however recorded major reduction moving to N75, N300 and ₦700 respectively.


The reduction was also extended to African countries including Benin Republic which goes for ₦650 per minute, Niger Republic ₦750, Ghana ₦500, and Togo ₦650. United Arab Emirates also moved from ₦450 to ₦325, Germany to ₦550, Côte d’Ivoire ₦700, Libya ₦700, while calls to Malawi is now N1,100 from ₦1,200.

Glo aims to provide more value for its customers through these revised rates, encouraging them to make Glo their preferred network for international calls. New IDD bundles will also be introduced, offering frequent international callers even more attractive deals.

Globacom, which remained optimistic that frequent international callers will benefit immensely from the reductions in IDD bundles, enjoined customers to take advantage of the new rates to stay connected with friends and business associates across the globe.

Continue Reading

GRTech

Oil subsidy removal freed up resources for infrastructure – Enugu Governor 

By Orji Israel, South East Correspondent

Published

on

Oil benchmark

The Executive Governor of Enugu State, Peter Mbah, has attributed the financing of numerous infrastructure projects embarked by the state government to the oil subsidy removal policy of the President Bola Ahmed Tinubu administration.

He made this declaration at the Govermment House, Enugu, during a courtesy visit by a delegation of federal government led by Minister of Information and National Orientation, Mohammed Idris, as part of activities lined up for the 2-day Citizens’ Engagement Series in the South East geo-political zone.

“For us in Enugu, we are able to accomplish all we promised our people during the campaign, thanks to the bold decision taken by President Bola Tinubu, which has freed up resources needed to execute humongous capital projects,” said Governor, while listing ongoing projects in the state, which include the construction of 7,000 classrooms, 3,300 hospital beds and 2,000-hectare of 260 farm estates across the 260 wards of the state.

Governor Mbah also pledged more support for the policies of the federal government, saying they are in the best interest of the people of the state.

Continue Reading

Trending