{ "Event": { "analysis": "0", "date": "2018-12-04", "extends_uuid": "", "info": "SamSam Ransomware - Alert (AA18-337A)", "publish_timestamp": "1544005078", "published": true, "threat_level_id": "3", "timestamp": "1544005070", "uuid": "5c065ec5-6ab0-4cc1-a032-bf18950d210f", "Orgc": { "name": "CIRCL", "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f" }, "Tag": [ { "colour": "#0088cc", "local": "0", "name": "misp-galaxy:ransomware=\"Samas-Samsam\"", "relationship_type": "" }, { "colour": "#0088cc", "local": "0", "name": "misp-galaxy:malpedia=\"SamSam\"", "relationship_type": "" }, { "colour": "#ffffff", "local": "0", "name": "tlp:white", "relationship_type": "" } ], "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1543921403", "to_ids": false, "type": "text", "uuid": "5c065efb-eda4-49fb-99b4-bf18950d210f", "value": "The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) are issuing this activity alert to inform computer network defenders about SamSam ransomware, also known as MSIL/Samas.A. Specifically, this product shares analysis of vulnerabilities that cyber actors exploited to deploy this ransomware. In addition, this report provides recommendations for prevention and mitigation.\r\n\r\nThe SamSam actors targeted multiple industries, including some within critical infrastructure. Victims were located predominately in the United States, but also internationally. Network-wide infections against organizations are far more likely to garner large ransom payments than infections of individual systems. Organizations that provide essential functions have a critical need to resume operations quickly and are more likely to pay larger ransoms.\r\n\r\nThe actors exploit Windows servers to gain persistent access to a victim\u00e2\u20ac\u2122s network and infect all reachable hosts. According to reporting from victims in early 2016, cyber actors used the JexBoss Exploit Kit to access vulnerable JBoss applications. Since mid-2016, FBI analysis of victims\u00e2\u20ac\u2122 machines indicates that cyber actors use Remote Desktop Protocol (RDP) to gain persistent access to victims\u00e2\u20ac\u2122 networks. Typically, actors either use brute force attacks or stolen login credentials. Detecting RDP intrusions can be challenging because the malware enters through an approved access point.\r\n\r\nAfter gaining access to a particular network, the SamSam actors escalate privileges for administrator rights, drop malware onto the server, and run an executable file, all without victims\u00e2\u20ac\u2122 action or authorization. While many ransomware campaigns rely on a victim completing an action, such as opening an email or visiting a compromised website, RDP allows cyber actors to infect victims with minimal detection.\r\n\r\nAnalysis of tools found on victims\u00e2\u20ac\u2122 networks indicated that successful cyber actors purchased several of the stolen RDP credentials from known darknet marketplaces. FBI analysis of victims\u00e2\u20ac\u2122 access logs revealed that the SamSam actors can infect a network within hours of purchasing the credentials. While remediating infected systems, several victims found suspicious activity on their networks unrelated to SamSam. This activity is a possible indicator that the victims\u00e2\u20ac\u2122 credentials were stolen, sold on the darknet, and used for other illegal activity.\r\n\r\nSamSam actors leave ransom notes on encrypted computers. These instructions direct victims to establish contact through a Tor hidden service site. After paying the ransom in Bitcoin and establishing contact, victims usually receive links to download cryptographic keys and tools to decrypt their network." }, { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1543921417", "to_ids": false, "type": "link", "uuid": "5c065f09-95cc-4a4e-9d15-47a1950d210f", "value": "https://www.us-cert.gov/ncas/alerts/AA18-337A" } ] } }