
![]() |
Global companies attacked, Department of Education hacked, are you armed?Not only did thousands of companies suffer from a severe Petya ransomware attack last week, but closer to home was the hacking of South Africa's Department of Education's system. Is your company prepared for what could still come? ![]() Damian Michael Ransomware: a brief history Ransomware and fake-antivirus have been around for many years, relying on social engineering to trick computer users into paying the cybercriminals, so their phoney warnings claim, to avoid fines from police for supposed crimes, or to clean up “viruses” on their computers that don’t actually exist. But CryptoLocker and CryptoWall – variations of the malware called crypto-ransomware or cryptoware – don’t bother with that sort of trickery. The attackers tell victims upfront that their files have been encrypted by ransomware. Unless you pay for the encryption key held by the attackers, the crooks destroy the private encryption key, making it impossible to recover your files. Examples of ransomware wreaking havoc around the worldPetyaThe initial Petya ransomware was made by Janus Cybercrime Solutions Professionals and they distributed the source code as a ransomware-as-a-service over the darknet. The recent outbreak dubbed NotPetya is a modified version of the Petya source code acting as a wiper or a phlashdancer. It is meant to destroy data from the victim's computer and professionals believe the cyber-criminals behind this kind of attack created the ransomware not to profit from it but to cause havoc. WannaCryThis family of ransomware has many names such as Wanna-Wana, Cryptor-Crypt0r, Cryptor-Decryptor, etc. WannaCry propagates using EternalBlue, an exploit of Windows' Server Message Block (SMB) protocol. Much of the attention and comment around the event was occasioned by the fact that the U.S. National Security Agency (NSA) had already discovered the vulnerability, but used it to create an exploit for its own offensive work, rather than report it to Microsoft. The payload works in the same fashion as most modern ransomware: it finds and encrypts a range of data files, then displays a ransom note informing the user and demanding a payment in bitcoin. It is considered a network worm because it also includes a transport mechanism to automatically spread itself. This transport code scans for vulnerable systems, then uses the EternalBlue exploit to gain access, and the DoublePulsar tool to install and execute a copy of itself. How it worksA ransomware attack goes through five stages from the time it installs on your computer to the appearance of the ransom warning on your screen. Crypro-ransomware usually attacks in five stages:
How was Department of Education attacked?These are some of the possible ways the department of education was attacked through ransomware. These could be the vulnerabilities:
People’s susceptibilities to manipulation and influence are the biggest security risks to businesses. Staying safe from Ransomware attacks
Ransomware protection, prevention, and mitigation
The reasons why you need a security expert
About Damian MichaelDamian Michael is the founder & MD at iNNOVO Networks. Nominated for the second time in this year's Entrepreneur of the Year Awards, Michael holds a wealth of versatile experience in both the public and the private sector. After completing his apprenticeship in the SA Navy as a radio/radar technician, he worked in sales and senior management positions for ICT operators like Vodacom and MTN, and was involved in successfully launching Neotel in South Africa. View my profile and articles... |