Ransomware attack to the database of University of Madras


By MYBRANDBOOK


Ransomware attack to the database of University of Madras

In a recent incidence in the University of madras the database faced a serious threat in the form of Ransomware (a malicious software) attack, following which the data was encrypted and the attacker demanded a ransom of Rs 18 lakh to restore access to the data.

 

With targeted ransomware attacks on the rise and as Sophospredicted in its 2019 Threat Report, we’re going to see even more such threats emerge. SophosLabs has uncovered Matrix, a targeted ransomware attack that is flying under the radar. While Matrix has been around since 2016, it is a good example of what a copycat targeted attack would look like.

 

In the latest Matrix ransomware report* released today, SophosLabs identifies brute-force attacks on weak Remote Desktop Protocols (RDP) as the common thread between various strains of targeted ransomware, including Matrix, BitPaymer, Dharma, SamSam, and Ryuk. However, Matrix is unique because it targets a single machine, rather than spreading through an organization, like SamSam. While this part of the attack is less sophisticated than others, Matrix also comes equipped with a “Swiss Army knife” of malware that helps it carry out its attack. Another difference is that Matrix cybercriminals force victims to message them directly to show proof of encryption before they disclose their ransom demand and amount.

 

The trend for targeted ransomware continues: Matrix Deconstructed

 

* Sophos released a report that delves into Matrix ransomware

* Primary means of access is through firewalls that have the Remote Desktop Protocol enabled

* As highlighted in Sophos’ 2019 Threat report, targeted ransomware attacks are gaining in prominence

 

Matrix ransom notes are embedded in the attack code, but victims don't know how much they must pay until they contact the attackers. For most of Matrix's existence, the authors used a cryptographically-protected anonymous instant messaging service, called bitmsg.me, but that service has now been discontinued and the authors have reverted to using normal email accounts. The threat actors behind Matrix make their demand for cryptocurrency ransom in the form of a U.S. dollar value equivalent. This is unusual as demands for cryptocurrency normally come as a specific value in cryptocurrency, not the dollar equivalent. It's unclear whether the ransom demand is a deliberate attempt at misdirection, or just an attempt to surf wildly fluctuating cryptocurrency exchange rates. Based on the communications SophosLabs had with the attackers, ransom demands were for US$2,500, but the attackers eventually reduced the ransom when researchers stopped responding to demands.

 

Matrix is very much the Swiss Army Knife of the ransomware world, with newer variants able to scan and find potential computer victims once inserted into the network. While sample volumes are small, that doesn't make it any less dangerous; Matrix is evolving and newer versions are appearing as the attacker are improving on lessons learned from each attack.

 

In Sophos’ 2019 Threat Report we highlighted that targeted ransomware will be driving hacker behavior, and organizations need to remain vigilant and work to ensure they are not an easy target.

 

Sophos recommends implementing the following four security measures immediately:

 

* Restrict access to remote control applications such as Remote Desktop (RDP) and VNC

* Complete, regular vulnerability scans and penetration tests across the network; if you haven’t followed through on recent pen-testing reports, do it now. If you don’t heed the advice of your pentesters, the cybercriminals will win

* Multi-factor authentication for sensitive internal systems, even for employees on the LAN or VPN

* Create back-ups that are offline and offsite, and develop a disaster recovery plan that covers the restoration of data and systems for whole organizations, all at once

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org