Chapter 9. CryptXXX

The CryptXXX ransomware first appeared at the end of March 2016 and quickly grew into one of the most popular ransomware families delivered via exploit kit. Currently, CryptXXX is primarily delivered via web exploitation kits using compromised websites and malware-infected advertisements.

It was first reported on by researchers at Proofpoint in conjunction with Frank Ruiz from Fox IT InTELL.1 The team behind CryptXXX made extensive use of the Angler exploit kit using the Bedep loader for earlier versions but, with the demise of Angler, moved on to other exploit kits in recent versions.

CryptXXX is also unique in that earlier versions of CryptXXX were delivered in DLL format rather than as an executable. Running the ransomware as a DLL instead of a PE often allows the CryptXXX family to bypass traditional antivirus solutions because the DLL will make calls to legitimate Windows system executables on the victim machine. Unless the antivirus program knows to look for suspicious DLL activity, CryptXXX will remain undetected until the encryption process is complete and the ransom note pops up.

CryptXXX is now primarily delivered via the Neutrino exploit kit, which targets vulnerabilities in three different Windows applications:

  • Adobe Flash
  • Microsoft Silverlight
  • Java and Java Runtime Environment (JRE)

CryptXXX also does more than just encrypt the files on a victim machine. Because the initial deployments used the Angler exploit kit and Bedep Loader, the CryptXXX developers took advantage of other capabilities in these tools. Prior to encrypting files on the system, the hackers would steal any banking information they could locate from the victim system—including anything in the Bitcoin wallet, which meant that any victims who happened to have enough bitcoins available to pay the ransom would have to reload their now depleted wallet before they could do so.

Who Developed CryptXXX?

There is a great deal of informed speculation that the team behind the Reveton ransomware family is also behind CryptXXX.2 The similarities between the two code bases include the fact that both ransomware families were written in Delphi, which is highly unusual for malware authors, the use of a DLL instead of a PE, and custom communication channels of TCP port 443 (but not SSL).3

This group, most likely based out of Russia, is a professional and skilled organization. The CryptXXX code has a number of advanced features, including detection for virtual environments and a delay between exploitation and the first callback to the command-and-control infrastructure. These two features make it harder for new variants of CryptXXX to be detected by typical security sandbox solutions, hence the speculation that the group behind CryptXXX is advanced.

Advanced Endpoint Protection Versus Sandboxing

There are a couple of different ways that advanced protection solutions can detect unknown malware. The first is through behavioral detection, which is what end-point solutions like those from Carbon Black, CrowdStrike, FireEye, and SentinelOne do. As mentioned previously, there are certain things that ransomware has to do in order to install itself and encrypt the hard drive. Those tasks include:

  1. Install itself onto the system using either exploitation or through someone clicking on a file.
  2. Inject into a process that has administrator access to the system.
  3. Maintain persistence between reboots.
  4. Enumerate the files on the file system and possibly on shared drives.
  5. Access the native encryption libraries on the victim machine.
  6. Read and write whole or chunks of files in rapid succession.
  7. Call out to the command-and-control infrastructure.
  8. Most, but not all, ransomware also works by deleting Volume Shadow Copies.

There are only so many ways to perform these tasks, so advanced end-point protection systems monitor for these types of behaviors on the desktop and in memory. When the end-point agent sees activity that looks suspicious, it either blocks the activity from occurring or reports it. These solutions are highly effective and provide protection beyond that offered by traditional, signature-based, antivirus solutions.

The alternative method for detecting new attacks is to use sandboxing technologies. These solutions from companies like Cisco, FireEye, and Palo Alto and hybrid solutions from companies like Cylance are effective because they execute new unknown applications in a virtual environment. They allow both “good” and “bad” unknown files to fully execute in a virtual environment to see what happens and then report on it. The advantage of this method is that it can detect new types of ransomware (as well as other types of malware) and attack methods that have not been used before, and do it in a way that does not impact the intended victim.

Just as security researchers are always finding new ways to detect ransomware, the teams behind ransomware are always looking for new ways to exploit and install ransomware. CryptXXX is no different. There have been at least three different versions of CryptXXX, each one improving some aspect of the code. Sandboxing is one way to discover new methods that even advanced end-point solutions may miss.

But there are downsides to sandboxing, and that is where the sandbox avoidance techniques that the team behind CryptXXX implemented come into play. The first problem is that sandboxing solutions rely on virtual environments, and most security vendors use VMWare or another well-known vendor for their virtual solution. There is nothing wrong with these solutions, but it is also trivial for an attacker to determine if they are running in a well-known virtual environment.

One way ransomware can detect if it is running in a virtual environment is simply by checking the output of the systeminfo command. If the system manufacturer is listed as “VMWare,” then the attacker knows it is a virtual environment and the ransomware should not run. That is a simple example and one that is easy to fix, but there are more advanced techniques that attackers can use to check the victim environment and prevent execution.

The second thing the team behind CryptXXX did to avoid detection by sandbox technologies is to put a delay in the ransomware. Some researchers report that CryptXXX will often wait as long as an hour before it executes. Because most sandbox vendors need to execute incoming files rapidly, they do not have the ability to wait an extended period for a file to execute. The assumption is that once a system is exploited the ransomware will execute immediately, so the virtual machines are shut down quickly. To avoid detection, ransomware developers will put the delay in, and the sandbox will not be able to record the malicious behavior; it may even think the file is benign. A second trick some ransomware developers implement is to wait until after a system reboots to launch the encryption process, again, foiling many sandboxing vendors.

The other advantage of delaying the start of the encryption process is that it puts separation between the initial exploit and the ransomware activity. This creates a potential problem for incident-response or forensics teams trying to reconstruct the attack. Over the course of an hour it is possible for a user to visit dozens of websites and, with the way ad networks work, hundreds of URLs. Trying to identify which of those sites were responsible for the original attack, especially if that site is not always serving up exploits, becomes a significant challenge. This makes it more difficult for the security team to protect the network by identifying and blocking a potentially bad domain name or the exploit that was used to launch the attack.

Crypt + XXX

The main thing that ties the CryptXXX developers to the team that created the Reveton ransomware is the name itself. The researchers at Proofpoint who named the file did so based on the fact that the ransomware appends the .crypt extension to the end of the newly encrypted files (though later versions of CryptXXX append the extension .cryp1 to the end of newly encrypted files). The XXX originates from the fact that the code security engineers who reverse-engineered it referred to themselves as XXX. This is also how the developers of the Angler exploit kit referred to their codebase.4

There has been speculation that the team behind the Reveton ransomware family was also the developer of the Angler exploit kit and all three groups (Angler, Reveton and CryptXXX) seem to operate out of the same general area. Of course, it is possible that the CryptXXX team expected to use the Angler exploit kit from the start and simply built the ransomware to fit into their model.

Whoever is ultimately behind it, it is very clear that they are sophisticated group that has a professional development process, fixing bugs, countering countermeasures, and adding enhancements in a timely fashion.

The first report of CryptXXX appeared April 2016, and by April 26, Kaspersky had released a decryption tool.5 In late April 2016, the CryptXXX team introduced version 2 of their ransomware, which bypassed the Kaspersky decryption tool. On May 13, Kaspersky released an updated tool. On May 16, the CryptXXX developers delivered version 3. At the time of this writing no one has released a decryptor tool for version 3 or higher. A fourth version of CryptXXX was uncovered by Fortinet on August 22.6 Figure 9-1 outlines the release timeline of CryptXXX to date.7

Figure 9-1. Timeline for CryptXXX releases (all dates in 2016)

This type of rapid release schedule makes it difficult for security vendors to stay ahead the CryptXXX team and continue to offer protection. In addition to changing their code, the CryptXXX team has also changed up their tactics, techniques, and procedures migrating from using only the Angler exploit kit as a delivery mechanism to adding in the Neutrino exploit kit (this change was most likely caused by the demise of the team behind Angler and the sudden disappearance of Angler activity) and, in version 5, adding delivery as a PE instead of relying on just DLLs.8 There is also a report of CryptXXX being delivered via spam, which most likely stems from the fact that Angler exploit kit activity disappeared completely in early June 2016.9

The Encryption Process

CryptXXX uses a number of different types of encryption algorithms to encrypt files on the victim machine. Prior to version 3 of the code the CryptXXX team used Rivest Cipher 4 (RC4) as the key stream for the encryption process, which allowed Kaspersky and other security companies to develop tools to decrypt the files. To counteract the decryptor tools, the team behind CryptXXX changed the encryption stream to a public key embedded in the DLL.

When CryptXXX is initially deployed, it generates a random seed based on the system time. That random seed is then used to create the RandomInt, which is then used to within a key-scheduling algorithm to generate the keys used to encrypt each blob of data.

When the encryption process is complete, CryptXXX appends either .crypt or .cryp1 to the end of the file, depending on the version that is being deployed.

CryptXXX looks for and encrypts more than 200 file types, including:

.3DS .3GP .7Z .AES .AI .APK .APP .ARC .ASC .ASF .ASM .ASP .ASPX
.ASX .AVI .BMP.BZ2 .C .CER .CFG .CFM .CGI .CGM .CLASS .CMD .CPP
.CRT .CS .CSR .CSS .CSV .CUE .DB .DBF .DCH .DCU .DIF .DIP .DOC
.DOCB .DOCM .DOCX .DOT .DOTM .DOTX .DTD .DWG .DXF .EML .EPS .FDB
.FLA .FLV .FRM .GBK .GIF .GPG .GPX .GZ .H .HTM .HTML .HWP .IBD
.IBOOKS IFF .INDD .JAR .JAVA .JKS .JPG .JS .JSP .KEY .KML .KMZ .M
.M3U .M4A .M4V .MP3 .MP4 .MPA .MAX .MDB .MDF .MFD .MID .MKV .MML
.MOV .MPG .NOTE .OBJ .ODB .ODG .ODP .ODS .ODT .PAGES .PAQ .PAS
.PCT .PDB .PDF .PEM .PHP .PIFPNG .PL .PLUGIN .POTX .PPS .PPSM
.PPSX .PPT .PPTM .PPTX .PRF .PRIV .PRIVATE .PS .PSD .PY .RA .RAR
.RAW .RM .RSS .RTF .SH .SLDX .SLK .SLN .SQL .SQLITE3 .SQLITEDB
.SRT .STW .SVG .SWF .SXW .TAR .TBK .TEX .TGA .THM .TIF .TIFF .TMP
.TGZ .TLB .TXT .VB .VBS .VCF .VDI .VMDK .VMX .VOB .WAV .WMA .WKS
.WMV.WPD .WPS .WSF .XCODEPROJ .XHTML .XLC .XLM .XLR .XLS .XLSB
.XLSM .XLSX .XLT .XLTM .XLTX .XLW .XML .ZIP .ZIPX

After the encryption process has completed, it leaves its ransom note in two different forms: an HTML file that is left in every directory where there are encrypted files and a bitmap file (as shown in Figure 9-2) that is set as the default image for the lock screen of the victim’s workstation. The ransom note lets users know their files have been encrypted and that they will need to visit a site on the Onion network in order to decrypt them. Helpfully, the note also tells victims where they can get access to a TOR-enabled browser.

Figure 9-2. CryptXXX ransom note

Clicking the link sends victims to a portal page, as shown in Figure 9-3, which tells them how much they will need to pay to decrypt their files.

Figure 9-3. The first screen of the CryptXXX ransomware portal

Protecting Against CryptXXX

As with the chapters on Cerber and Locky, this section will focus on ways to protect specifically against CryptXXX. There are helpful tips throughout this book to protect against generic ransomware, but this section will focus on steps to specifically stop CryptXXX.

No More Ransom

One of the first things a victim who is infected with ransomware should do is check to see if there is a decryptor tool available. Kaspersky teamed with a number of security organizations to create a website that helps victims quickly determine which ransomware family they have been infected with, which version of the ransomware it is, and whether or not there is a decryptor tool. The site is called No More Ransom.

Because CryptXXX is primarily delivered through exploit kits, the best way to protect against it is to defend against the exploit kits themselves. If the exploit kits can’t do their job—exploit the target endpoint—then CryptXXX cannot be installed. While TTPs can, and do, change over time, today protecting against exploit kits delivering CryptXXX means defending against the Angler and Neutrino exploit kits.

As with other types of ransomware, the best protection against CryptXXX is to stop it before it can be installed on the target system. In order to do that with CryptXXX, security teams must prevent the system from being exploited in the first place.

One way to prevent the target system from being exploited is to maintain an up-to-date list of sites that are infected by the Neutrino exploit kit and block access to those sites. The challenge is that the list of sites infected with these exploit kits is constantly evolving. Unless the security team is willing to make constant updates or subscribes to a security solution that automatically updates the latest known bad domains, it is unlikely that most organizations will be able to keep up with all of the changes.

There is also a good chance that a number of infected domains will be missed. There is also the possibility that sites that can’t be easily blocked will be infected, such as when Yahoo!’s ad network was infected with an exploit kit for almost a week in 2015.10 While it is easy to completely block access to some sites, larger sites, even if they are temporarily infected, are often politically difficult for an organization to block.

Another way to protect against CryptXXX is to disable the applications that the exploit kits that deliver CryptXXX like to exploit. If there is no reason to run Adobe Flash, Java, or Microsoft’s Silverlight on most workstations, then why install them at all? There may be some grumbling, but many users will not see any disruption to their workday even with the applications disabled. For those users that have a legitimate use case to have one or more of these applications installed, extra monitoring or additional security measures can be taken for those systems.

Sometimes removing these applications, or not installing them in the first place, is simply not an option. In these cases security teams should ensure that they are installed with the highest possible security settings and that the applications are kept up to date, with new patches installed immediately. As discussed previously, it is very rare for exploit kits to use a zero-day exploit against their targets, so as long as new security patches are installed quickly, the organization will usually be safe—of course, there are always exceptions.

Exploit Kits

When an unsuspecting target visits a web page (either one controlled by the hacker group, or one that they have compromised) the exploit kit fingerprints the person making the request to determine what applications, and more importantly, what versions of the applications are running on the target host. Based on the results of the fingerprinting, the exploit kit decides which of its exploits to attempt to use against the visitor.

Again, if the vulnerable or targeted plug-in is not installed, there is nothing there for the exploit kit to attempt attack. Unless, of course, there is an known exploit against the browser itself. Fortunately, browser exploits are a lot more rare than they used to be and when they do pop up they are patched a lot faster.

Whenever possible, try not to install browser plug-ins if it can be avoided. Adobe PDF Reader is a perfect example of this. Almost everyone has Adobe PDF Reader installed. Many documents used in the workplace require a PDF reader and Adobe is the most common. But there is rarely any reason to install it as a browser plug-in. There is no productivity loss when a user has to download a PDF and read it outside of the browser. Given that PDF vulnerabilities occur with some frequency, why introduce the additional risk of having the PDF vulnerability directly in the browser?

Of course, that doesn’t stop an attacker from loading a PDF with a malicious JavaScript that can execute a vulnerability and download malicious code, but today that is not a technique that the CryptXXX team is using.

It is not always possible to avoid browser plug-ins. There are always specialized applications that require the Java or Adobe Flash plug-ins. In cases where these plug-ins must be installed, it is important that they are kept up to date. As discussed in Chapter 5, an asset management platform should be in place that catalogs browser and plug-in type and version information across the enterprise.

It is also important for security teams to track updates to the Angler (assuming it resumes operations) and Neutrino exploit kits. There are a number of great sites out there that track changes to the different exploit kits and provide timely updates to new exploits and payloads that are being used by the different exploit kits. One of the best is Malware-Traffic-Analysis. Beyond the great work that Malware-Traffic-Analysis is doing, there are number of great resources from different security vendors. Security teams that have good relationships with their security vendors should find out where those vendors publish updated analysis information and track those sites closely. This helps security teams understand what types of ransomware their current solutions protect against and can be used to question ransomware families for which their vendors might not have coverage.

DNS Firewalls and IDS

Another significantly more challenging way to prevent a CryptXXX attack is blocking access to the infected domains the exploit kits are using. Generally, the team behind CryptXXX does not set up malicious websites to launch attacks. Instead, they rely on being able to compromise websites like those using WordPress or Joomla or take advantage of poor security monitoring in ad networks to deliver their ransomware.11

At any one time, there are a large number of websites that are compromised and being used to attack unsuspecting victims. There is also a large group of researchers who spend their days scanning for and listing those compromised websites. For example, the Ransomware Tracker Website and the previously mentioned Malware Domain List are both good ways to track current malware activity.

Since, at the time of writing, the CryptXXX team relies primarily on web-based exploit kits to deliver their ransomware being able to block these compromised domains can help protect a network.

Challenges with domain blocking

But there are a number of limitations to domain blocking. First off, it is almost impossible to track every compromised website that is out there. Using lists like this can often instill an unwarranted sense of confidence. Many security teams feel that just tracking lists of domains is enough and don’t put the same effort into other security measures. Domain blocking is a powerful tool, but should be one of many tools in place.

A second problem occurs when these compromised sites remove the infection and the block lists are not updated. While users not being able to reach their favorite crossover fanfiction website is probably not going to impact day-to-day operations, blocking access for extended periods of time to legitimate sites can disrupt productivity.

That is where DNS firewalls come into play. DNS firewalls have a couple of advantages over traditional domain-blocking mechanisms such as web proxies and intrusion detection systems (IDS).

DNS firewalls

The first advantage is that they are able to black hole any traffic to the domain. While some solutions focus only on ports 80 and 443, a DNS firewall, when configured to block, will stop any requests to a malicious domain from even leaving the organization’s network. This means that attackers looking to bypass traditional proxies by sending out command-and-control information embedded in a DNS request will still be stopped.

Secondly, some DNS firewalls, like the offerings from eSentire, OpenDNS, and ThreatSTOP, have curated intelligence to provide the most up-to-date information. This significantly reduces the chances of false positives and false negatives. Some DNS firewall vendors, such as ThreatSTOP even have intelligence around ransomware families and can specifically block traffic destined for known ransomware command-and-control infrastructure, as shown in Figures 9-4 and 9-5.

Figure 9-4. ThreatSTOP ransomware indicator of compromise
Figure 9-5. ThreatSTOP report on a ransomware domain

DNS firewalls also have the advantage of being able to ingest third-party intelligence. So, if an organization is working with its industry Information Sharing and Analysis Center (ISAC) or other intelligence sharing organization, it is able to take the indicators provided and feed them into its DNS firewall for added protection.

Remember These Are Exploit Kit Preventions

All of this talk around domain names applies to protecting against the exploit kits that deliver CryptXXX, not to stopping CryptXXX communication itself. CryptXXX communicates using IP addresses rather than domain names, so a DNS firewall will not be effective in stopping that communication unless it has a separate component, as ThreatSTOP does, designed to block IP addresses at the firewall level.

Again, a DNS firewall should not be the only solution to protecting against the exploit kits but one can significantly improve the chances of stopping an exploit kit from infecting targets within the network and preventing CryptXXX from ever reaching its victim. For even better protection, combine a DNS firewall with an IDS that has an updated signature set.

Using an IDS

There is a catch to relying on an IDS: it requires constant maintenance as the hacking groups behind the exploit kits change their tactics. So, even having an updated signature set may not be enough if that signature set is not tuned to detect the current tactics used by the groups behind Neutrino and other exploit kits. Snort, for example, does not include exploit kit detection as part of its community signature set, although it does make those signatures available in a separate signature set available to registered users (registration is free). This set includes a number of signatures designed to detect Neutrino (line breaks added for clarity):

alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any 
(msg:"EXPLOIT-KIT Neutrino exploit kit landing page detected"; 
flow:to_client, established; file_data; content:"return"; 
content:"join"; within:8; 
content:"MSIE |28 5C|d+|5C|.|5C|d+|29 3B|"; distance:0; 
content:"navigator["; within:60; content:!"]"; within:10; 
metadata:policy balanced-ips drop, policy security-ips drop, 
service http; classtype:attempted-user; sid:36535; rev:3;)

The two rules listed in the example will help detect instances of Neutrino that may be missed by the DNS firewalls because the domains are not known to be compromised yet. Enhancing the rulesets to include exploit kit or ransomware detection puts an additional load on the IDS, which may result in dropped packets or missed alerts. Remember, despite all of the press, ransomware still accounts for a small (albeit rapidly growing) portion of malware targeting users. While it is important to detect against ransomware, it is a bad idea to do it at the expense of other types of malware.

Keeping users informed

User education is a very important part of protecting an organization against ransomware, which is why Chapter 5 is dedicated to the topic. User education is an ongoing process, and sometimes it takes a few times before the message sticks. In the world of marketing there is an old adage called the rule of seven, which means that customers have to hear a message seven times before they will “take action” (a euphemism for “buy your stuff”).

One of the ways that security teams can provide continuous training to users is to set up informative redirect pages when a user attempts to visit a ransomware site. Most organizations simply block or blackhole malicious traffic, so users don’t know why they couldn’t get to their intended site. If a redirect page is set up, it is often uninformative and doesn’t help users correct their behavior.

Many security vendors give security teams the ability to set up more informative redirect pages that can actually be used to educate the user, like the one shown in Figure 9-6, but not enough security teams take advantage of these capabilities. It is worthwhile for security teams to investigate the redirect capabilities of their security tools and start using them as educational tools.

Figure 9-6. ThreatSTOP redirect page

Stopping CryptXXX

Despite the best attempts of security teams to detect and prevent exploitation by the exploit kits, the truth is it is still possible that CryptXXX will bypass defenses and attempt to infect a machine. Those infections may come because the hacker group behind CryptXXX changes their tactics, such as using email as an attack vector, or users may infect their end-point while outside of the organization’s network defenses. This means that there needs to be systems in place to detect and stop CryptXXX itself, or at least minimize the damage.

One of the unique things about CryptXXX is that the initial callout to its check-in command-and-control host is to an IP address instead of a domain name. It also uses TCP port 443 for communication, but the traffic is not TLS. Any organization actively monitoring TLS traffic can alert on malformed TLS traffic to an IPS address and have a high level of confidence that even if it is not CryptXXX, it is most likely something bad.

There are also Snort signatures that are in place to specifically check CryptXXX check-in traffic (line breaks added for clarity):

alert tcp $HOME_NET any -> $EXTERNAL_NET 443 
(msg:"MALWARE-CNC CryptXXX initial outbound connection"; 
flow:to_server,established; content:"|20|"; depth:1; 
content:"|91 70 00 00 00 00 00 00 00 00 00 00|"; within:12; 
distance:35; metadata:impact_flag red, policy balanced-ips alert, 
policy security-ips alert; 
reference:url,virustotal.com/en/file/0b12584302a5a72f467a08046814
593ea505fa397785f1012ab973dd961a6c0e/analysis/; 
classtype:trojan-activity; sid:38784; rev:2;)

Blocking on the initial check-in traffic will prevent the CryptXXX variant from connecting with the command-and-control infrastructure, but it may not prevent the encryption process from happening. Basically, this alerts security teams that someone is infected, so they can respond quickly and prevent more damage across the network.

CryptXXX is unique in that, most of the time, it installs at as a DLL instead of an executable, which is unusual. The loader also usually drops it into the AppData folder, something like this (line break added for clarity):

C:Users\%Username%AppDataLocalTemp
{FA68702D-3D3D-5724-9808-175329768396}
api-ms-win-system-advpack-l1-1-0.dll

Using Microsoft’s group policy editor it is possible to restrict installing files, even DLLs into that directory. If CryptXXX cannot be installed into that directory, it will fail and the target system will not be infected. The same effect can be achieved, often with more precision, by using an advanced end-point protection system like Carbon Black or SentinelOne.

Another unique feature of CryptXXX is that it will scan for more drives and attempt to encrypt the data on those drives. CryptXXX does this in two ways:

  1. Looks on the local system for mapped drives from B: to Z:
  2. Scans the network on port 445 looking for open shared drives or folders

Addressing the second problem is easy—don’t allow any open shared drives or folders on the network, which is something that can be enforced as a policy in Windows and should be.

Addressing the first problem is also easy, but will undoubtedly be unpopular. It is also possible to set policy so that a user is required to reauthenticate to a shared drive every time they access it. By setting a policy that does this, CryptXXX may infect a single system, but it will not wreak havoc across the entire organization.

Enabling some of the security options outlined here will allow an organization to better protect against CryptXXX, as well as other ransomware families. Remember, only using one of these security options is not enough. A multilayered security strategy is the most effective way to combat a threat like ransomware.

Of course, as discussed in Chapter 5, multilayered security is not as effective if the different systems and security options in place do not talk to one another. Windows alerts, end-point alerts, DNS firewall alerts, firewall alerts, and IDS alerts should all be correlated in a single place. Whatever tool is used to correlate those events should be easily accessed by all members of the security team, allow security teams to have a big-picture understanding of what happened, and allow them to take meaningful action based on the correlation of events.

Summary

CryptXXX is dynamic ransomware with a professional and well-funded team backing it. This has led to frequent releases and adaptive tactics as the security situation has changed.

The best way to protect a machine against CryptXXX is to protect against the exploit kits, which are the primary means of distributing CryptXXX. The best protection against exploit kits is to minimize the number of plug-ins that are loaded into browsers. Plug-ins that must be loaded into browsers should always be kept fully patched, as should the browsers themselves.

Barring the ability to control plug-ins, the next best choice is a combination of DNS firewalls and updated IDS signatures as a way to alert, and hopefully block, access to the malicious sites that are (usually inadvertently) hosting the exploit kits.

On the desktop, the use of advanced end-point protection tools to actively monitor and block behavior that is indicative of CryptXXX helps to protect against the ransomware itself. Of course, all of these tools working separately is less effective than having them correlate events using a security information and event management (SIEM) or some other event aggregator. Correlating events from these different tools and having someone actively monitor for those alerts helps security teams be most effective at proactively stopping CryptXXX attacks.

1 Kafeine, “CryptXXX: New Ransomware From the Actors Behind Reveton, Dropping Via Angler,” Proofpoint, April 18, 2016.

2 “CryptXXX: New Ransomware From the Actors Behind Reveton, Dropping Via Angler”.

3 Teri Robinson, “Reveton Actors behind New CryptXXX Ransomware,” SC Magazine, Haymarket Media, April 19, 2016.

4 Kafeine, “XXX Is Angler EK,” Malware Don’t Need Coffee, Dec 21, 2015.

5 John Snow, “How to unlock a .crypt file,” Kaspersky Lab Daily, April 26, 2016.

6 Donna Wang and He Xu, “CryptXXX Ransomware Emerges For a Slice of the Pie,” Fortinet Blog, August 22, 2016.

7 Proofpoint Staff, “CryptXXX Ransomware Learns the Samba, Other New Tricks With Version 3.100,” Proofpoint, June 1, 2016.

8 Tom Spring, “CryptXXX Ransomware Jumps From Angler to Neutrino Exploit Kit,” Threatpost, June 9, 2016.

9 Proofpoint Staff, “Spam, Now With a Side of CryptXXX Ransomware!” Proofpoint, July 14, 2016.

10 Liam Tung, “Flash Bites Again: Huge Malware Campaign Hits Yahoo Ads,” ZDNet, August 5, 2015.

11 Security Week News, “Thousands of Websites Compromised to Spread CryptXXX Ransomware,” Security Week, July 11, 2016.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.234.62