SlideShare a Scribd company logo
1 of 33
Download to read offline
勒索軟體態樣與應處
大綱
• 甚麼是勒索軟體
• 勒索軟體如何散播
• 勒索軟體實際發生DEMO
• SNAPSHOT DEMO
• SHAREFOLDER DEMO
• 預防對策
• Q&A
甚麼是勒索軟體
• Ransomware is a type of malware that restricts
access to a computer system that it infects in some
way, and demands that the user pay a ransom to
the operators of the malware to remove the
restriction.
勒索軟體家族簡介
家族名稱 別稱 說明
ACCDFISA
Anti Cyber Crime
Department of
Federal Internet
Security Agency
Ransom
First spotted early 2012; Encrypts files into a password-
protected; Cybercriminals behind this ransomware asks payment
thru Moneypak, Paysafe, or Ukash to restore the files and unlock
the screen; Known as a multi-component malware packaged as a
self-extracting (SFX) archive; May come bundled with third party
applications such as Sdelete and WinRAR
ANDROIDOS_LOCKER
First mobile ransomware spotted; Uses Tor, a legitimate service
that allows anonymous server connections; Users with mobile
devices affected by this malware may find the files stored in their
mobile device rendered useless and held for ransom
CRIBIT BitCrypt
Similar to CRILOCK with its use of RSA-AES encryption for target
files; Version 1 uses RSA-426; Version 2 uses RSA-1024;
Appends the string bitcryp1 (for version 1) and bitcrypt2 (for
version 2) to the extension name of the files it encrypts
CRILOCK CryptoLocker
Employs Domain Generation Algorithm (DGA) for its C&C
server connection; October 2013 - UPATRE was found to be
the part of the spam mail that downloads ZBOT, which
further downloads CRILOCK
CRITOLOCK
Cryptographic
locker
Uses advanced encryption standard (AES-128) cryptosystem; The
word Cryptolocker is written in the wallpaper it uses to change an
affected computer's wallpaper
CRYPAURA
Encrypts files and appends the corresponding email address
contact for file decryption
勒索軟體家族簡介
CRYPCTB
Critroni, CTB Locker, Curve-Tor-Bitcoin
Locker
Encrypts data files; Ensures there is
no recovery of encrypted files by
deleting its shadow copies; Arrives via
spam mail that contains an
attachment, actually a downloader of
this ransomware; Uses social
engineering to lure users to open the
attachment; Uses Tor to mask its C&C
communications
CRYPDEF CryptoDefense
To decrypt files, it asks users to pay
ransom money in bitcoin currency
CRYPTCOIN CoinVault
Encrypts files and demands users to
pay in bitcoin to decrypt files; Offers a
one-time free test to decrypt one file
CRYPTFILE
Uses unique public key generated
RSA-2048 for file encryption and also
asks users to pay 1 bitcoin to obtain
private key for decrypting the files
CRYPWALL
CryptoWall, CryptWall, CryptoWall
3.0
Reported to be the updated
version of CRYPTODEFENSE; Uses
bitocin currency as mode of
payment; Uses Tor network for
anonymity purposes; Arrives via
spam mail, following UPATRE-
ZBOT-RANSOM infection chain;
CryptoWall 3.0 comes bundled
with FAREIT spyware
CRYPTROLF
Shows troll face image after file
encryption
勒索軟體家族簡介
CRYPTTOR
Changes the wallpaper to picture of
walls and asks users to pay the
ransom
CRYPTOR batch file ransomware
Arrives thru DOWNCRYPT; A batch file
ransomware capable of encrypting
user files using GNU Privacy Guard
application
DOWNCRYPT batch file ransomware
Arrives via spam email; Downloads
BAT_CRYPTOR and its components
such as a decoy document
VIRLOCK VirLock, VirRansom
Infects document files, archives, and
media files such as images
PGPCODER
Discovered in 2005; first ransomware
seen
KOLLAH
One of the first ransomware that
encrypts files using certain extension
names; Target files include Microsoft
Office documents, PDF files, and other
files deemed information-rich and
relevant to most users; Adds the
string GLAMOUR to files it encrypts
KOVTER
Payload of the attack related to
YouTube ads that lead to the Sweet
Orange exploit kit
MATSNU
Backdoor that has screen locking
capabilities; Asks for ransom
勒索軟體家族簡介
RANSOM
Generic detection for applications that
restrict the users from fully accessing
the system or encrypts some files and
demands aransom in order to decrypt
or unlock the infected machine
REVETON Police Ransom
Locks screen using a bogus display
that warns the user that they have
violated federal law; Message further
declares the user's IP address has
been identified by the Federal Bureau
of Investigation (FBI) as visiting
websites that feature illegal content
VBUZKY
64-bit ransomware; Attempts to
use Shell_TrayWnd injection; Enables
TESTSIGNING option of Windows 7
CRYPTOP Ransomware archiver
Downloads GULCRYPT and its
components
GULCRYPT Ransomware archiver
Archives files with specific extensions;
Leaves a ransom text file containing
the instructions on who to contact and
how to unpack the archives containing
user's files
CRYPWEB PHP ransomware
Encrypts the databases in the web
server making the website
unavailable; Uses HTTPS to
communicate with the C&C server;
Decrypt key is only available in the
C&C server
勒索軟體家族簡介
CRYPDIRT Dirty Decrypt
First seen in 2013 before the
emergence of Cryptolocker
CRYPTORBIT
Detection for images, text, and HTML
files which contain ransom notes that
are indicators of compromised (IOC)
CRYPTLOCK TorrentLocker
Poses as CryptoLocker; newer
variants display crypt0l0cker on the
affected computer; uses a list of file
extensions that it avoids encrypting,
compared to usual ransomware that
uses a list of file extensions to encrypt
- this allows CRYPTLOCK to encrypt
more files while making sure the
affected computer still runs, ensuring
users know that their files are
encrypted and access to the Internet
to pay the ransom is still present
CRYPFORT CryptoFortress
Mimics TorrentLocker/CRYPTLOCK
user interface; Uses wildcards to
search for file extensions; encrypts
files in shared folders
CRYPTESLA TeslaCrypt
User interface is similar to
CryptoLocker; encrypts game-related
files
勒索軟體家族簡介
CRYPVAULT VaultCrypt
Uses GnuPG encryption tool;
downloads hacking tool to steal
credentials stored in web browsers;
uses sDelete 16 times to
prevent/hinder recovery of files; has a
customer support portal; is a batch
script crypto-ransomware
CRYPSHED Troldesh
First seen in Russia; added English
translation to its ransom note to
target other countries; aside from
appending .xtbl to the file name of
the encrypted files, it also encodes
the file name, causing affected users
to lose track of what files are lost
SYNOLOCK SynoLocker
Exploits Synology NAS devices'
operating system (DSM 4.3-3810 or
earlier) to encrypt files stored in that
device; has a customer support portal
KRYPTOVOR Kriptovor
Part of a multi-component infection;
aside from its crypto-ransomware
component, it has an information
stealing component that steals certain
files, processes list, and captures
desktop screenshot; uses an open
source Delphi library calledLockBox
3 to encrypt files
CryptoLocker
Check Point發現離線執行不需C&C的
勒索軟體
Linux勒索軟件惡意來襲
Mabouia:史上第一款Mac OS X勒索
贖金軟件
Chimera勒索軟件升級:不給錢就公
佈個人信息
犯罪成本越來越低:三步即可傻瓜
化製作勒索軟件
全球首款開源勒索軟件– Hidden Tear
勒索軟體全面爆發!
勒索軟體全面爆發!
勒索軟體全面爆發!
勒索軟體全面爆發!
勒索軟體如何散播
勒索軟體
如何散播
• SPAM EMAIL
• Downloaders
& botnets
• Social engineering
and
self-propagation
Exploit Kit & CRYPTOWALL MALWARE
• NUCLEAR Exploit Kit & CRYPTOWALL
MALWARE
Exploit iNTRODUCTION
• ExploitKit is a toolkit that automates the exploitation of client-
side vulnerabilities, targeting browsers and programs that a
website can invoke through the browser.
CHANITOR/VAWTRAK MALSPAM -
SUBJECT: E-TICKET FROM AMERICAN
AIRLINES
勒索軟體實際發生DEMO
勒索軟體 Snapshot DEMO
Vm拖拉_SHAREFOLDER DEMO
VM_SHAREFOLDER DEMO
NETWORK_SHAREFOLDER DEMO
預防對策
• 定期備份重要文件
• 不點來路不明之文件
• 定期更新電腦安全更新及防毒
Q & A

More Related Content

What's hot

What's hot (20)

Malware Evasion Techniques
Malware Evasion TechniquesMalware Evasion Techniques
Malware Evasion Techniques
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Exploits
ExploitsExploits
Exploits
 
Embedded government espionage
Embedded government espionageEmbedded government espionage
Embedded government espionage
 
Botnets
BotnetsBotnets
Botnets
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for public
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Inception framework
Inception frameworkInception framework
Inception framework
 
Network Security
Network SecurityNetwork Security
Network Security
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
BOTNET
BOTNETBOTNET
BOTNET
 
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
 
WiFi security
WiFi security WiFi security
WiFi security
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
about botnets
about botnetsabout botnets
about botnets
 
Botnet
Botnet Botnet
Botnet
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 

Similar to 勒索軟體態勢與應措

Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
Yury Chemerkin
 

Similar to 勒索軟體態勢與應措 (20)

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Ransomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRansomware - Rameez Shahzada
Ransomware - Rameez Shahzada
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Comparative Study of Fileless Ransomware
Comparative Study of Fileless RansomwareComparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

勒索軟體態勢與應措

  • 2. 大綱 • 甚麼是勒索軟體 • 勒索軟體如何散播 • 勒索軟體實際發生DEMO • SNAPSHOT DEMO • SHAREFOLDER DEMO • 預防對策 • Q&A
  • 3. 甚麼是勒索軟體 • Ransomware is a type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction.
  • 4. 勒索軟體家族簡介 家族名稱 別稱 說明 ACCDFISA Anti Cyber Crime Department of Federal Internet Security Agency Ransom First spotted early 2012; Encrypts files into a password- protected; Cybercriminals behind this ransomware asks payment thru Moneypak, Paysafe, or Ukash to restore the files and unlock the screen; Known as a multi-component malware packaged as a self-extracting (SFX) archive; May come bundled with third party applications such as Sdelete and WinRAR ANDROIDOS_LOCKER First mobile ransomware spotted; Uses Tor, a legitimate service that allows anonymous server connections; Users with mobile devices affected by this malware may find the files stored in their mobile device rendered useless and held for ransom CRIBIT BitCrypt Similar to CRILOCK with its use of RSA-AES encryption for target files; Version 1 uses RSA-426; Version 2 uses RSA-1024; Appends the string bitcryp1 (for version 1) and bitcrypt2 (for version 2) to the extension name of the files it encrypts CRILOCK CryptoLocker Employs Domain Generation Algorithm (DGA) for its C&C server connection; October 2013 - UPATRE was found to be the part of the spam mail that downloads ZBOT, which further downloads CRILOCK CRITOLOCK Cryptographic locker Uses advanced encryption standard (AES-128) cryptosystem; The word Cryptolocker is written in the wallpaper it uses to change an affected computer's wallpaper CRYPAURA Encrypts files and appends the corresponding email address contact for file decryption
  • 5. 勒索軟體家族簡介 CRYPCTB Critroni, CTB Locker, Curve-Tor-Bitcoin Locker Encrypts data files; Ensures there is no recovery of encrypted files by deleting its shadow copies; Arrives via spam mail that contains an attachment, actually a downloader of this ransomware; Uses social engineering to lure users to open the attachment; Uses Tor to mask its C&C communications CRYPDEF CryptoDefense To decrypt files, it asks users to pay ransom money in bitcoin currency CRYPTCOIN CoinVault Encrypts files and demands users to pay in bitcoin to decrypt files; Offers a one-time free test to decrypt one file CRYPTFILE Uses unique public key generated RSA-2048 for file encryption and also asks users to pay 1 bitcoin to obtain private key for decrypting the files CRYPWALL CryptoWall, CryptWall, CryptoWall 3.0 Reported to be the updated version of CRYPTODEFENSE; Uses bitocin currency as mode of payment; Uses Tor network for anonymity purposes; Arrives via spam mail, following UPATRE- ZBOT-RANSOM infection chain; CryptoWall 3.0 comes bundled with FAREIT spyware CRYPTROLF Shows troll face image after file encryption
  • 6. 勒索軟體家族簡介 CRYPTTOR Changes the wallpaper to picture of walls and asks users to pay the ransom CRYPTOR batch file ransomware Arrives thru DOWNCRYPT; A batch file ransomware capable of encrypting user files using GNU Privacy Guard application DOWNCRYPT batch file ransomware Arrives via spam email; Downloads BAT_CRYPTOR and its components such as a decoy document VIRLOCK VirLock, VirRansom Infects document files, archives, and media files such as images PGPCODER Discovered in 2005; first ransomware seen KOLLAH One of the first ransomware that encrypts files using certain extension names; Target files include Microsoft Office documents, PDF files, and other files deemed information-rich and relevant to most users; Adds the string GLAMOUR to files it encrypts KOVTER Payload of the attack related to YouTube ads that lead to the Sweet Orange exploit kit MATSNU Backdoor that has screen locking capabilities; Asks for ransom
  • 7. 勒索軟體家族簡介 RANSOM Generic detection for applications that restrict the users from fully accessing the system or encrypts some files and demands aransom in order to decrypt or unlock the infected machine REVETON Police Ransom Locks screen using a bogus display that warns the user that they have violated federal law; Message further declares the user's IP address has been identified by the Federal Bureau of Investigation (FBI) as visiting websites that feature illegal content VBUZKY 64-bit ransomware; Attempts to use Shell_TrayWnd injection; Enables TESTSIGNING option of Windows 7 CRYPTOP Ransomware archiver Downloads GULCRYPT and its components GULCRYPT Ransomware archiver Archives files with specific extensions; Leaves a ransom text file containing the instructions on who to contact and how to unpack the archives containing user's files CRYPWEB PHP ransomware Encrypts the databases in the web server making the website unavailable; Uses HTTPS to communicate with the C&C server; Decrypt key is only available in the C&C server
  • 8. 勒索軟體家族簡介 CRYPDIRT Dirty Decrypt First seen in 2013 before the emergence of Cryptolocker CRYPTORBIT Detection for images, text, and HTML files which contain ransom notes that are indicators of compromised (IOC) CRYPTLOCK TorrentLocker Poses as CryptoLocker; newer variants display crypt0l0cker on the affected computer; uses a list of file extensions that it avoids encrypting, compared to usual ransomware that uses a list of file extensions to encrypt - this allows CRYPTLOCK to encrypt more files while making sure the affected computer still runs, ensuring users know that their files are encrypted and access to the Internet to pay the ransom is still present CRYPFORT CryptoFortress Mimics TorrentLocker/CRYPTLOCK user interface; Uses wildcards to search for file extensions; encrypts files in shared folders CRYPTESLA TeslaCrypt User interface is similar to CryptoLocker; encrypts game-related files
  • 9. 勒索軟體家族簡介 CRYPVAULT VaultCrypt Uses GnuPG encryption tool; downloads hacking tool to steal credentials stored in web browsers; uses sDelete 16 times to prevent/hinder recovery of files; has a customer support portal; is a batch script crypto-ransomware CRYPSHED Troldesh First seen in Russia; added English translation to its ransom note to target other countries; aside from appending .xtbl to the file name of the encrypted files, it also encodes the file name, causing affected users to lose track of what files are lost SYNOLOCK SynoLocker Exploits Synology NAS devices' operating system (DSM 4.3-3810 or earlier) to encrypt files stored in that device; has a customer support portal KRYPTOVOR Kriptovor Part of a multi-component infection; aside from its crypto-ransomware component, it has an information stealing component that steals certain files, processes list, and captures desktop screenshot; uses an open source Delphi library calledLockBox 3 to encrypt files
  • 22. 勒索軟體 如何散播 • SPAM EMAIL • Downloaders & botnets • Social engineering and self-propagation
  • 23. Exploit Kit & CRYPTOWALL MALWARE • NUCLEAR Exploit Kit & CRYPTOWALL MALWARE
  • 24. Exploit iNTRODUCTION • ExploitKit is a toolkit that automates the exploitation of client- side vulnerabilities, targeting browsers and programs that a website can invoke through the browser.
  • 25.
  • 26. CHANITOR/VAWTRAK MALSPAM - SUBJECT: E-TICKET FROM AMERICAN AIRLINES
  • 33. Q & A