LogRhythm Next Generation Ransomware Brochure 2017
Mobile ransomware:
Like most cybercrime trends, what starts on the desktop
will eventually spread to the smartphone and tablet. Mobile
ransomware works differently to its desktop counterpart but the
aim is the same – to prevent users being able to access their files.
Mobile ransomware is still a relatively low-profile threat but a
growing number of variants targeting mobile platforms are
being detected.
Zombie ransomware:
Ransomware strains once thought to be extinct are being revived
and equipped with new methods of attack. In an effort to attract
more victims with minimum effort, ransomware groups are
reusing and updating their existing malware variants with different
cryptography or malicious extensions to help them spread more
effectively and prevent files being decrypted without a ransom
being paid.
17 per cent
of businesses
have fallen
victim to
ransomware[2]
Democratisation of ransomware:
Once the province of skilled practitioners, distributing ransomware
is now open to everyone regardless of their technical ability.
Would-be criminals can invest in ransomware-as-a-service, buying
access to an existing ransomware set-up which they can then tailor
according to their preferences. Commercial ransomware-as-aservice providers offer similar services to other legitimate online
businesses, such as live customer support. In return, they receive a
share of the profits their customers generate.
Anatomy of a ransomware attack
Ransomware typically finds its way into corporate networks when users open
malicious email attachments or visit compromised sites, known as watering
holes. Recently, however, some ransomware variants have been designed to
spread laterally through networks.
The malware will try to evade antivirus software and, if successfully installed,
will encrypt a user’s files, preventing the user accessing them.
The ransomware will then request a ransom, usually in the region of
several hundred dollars, to release the files. If the victim decides to pay
the ransom, they will have to transfer the fee to the ransomware writer in
a cryptocurrency such as Bitcoin. Once the payment has been registered,
the user will receive a cryptographic key allowing them to decrypt files
and regain access to their system. Although in some cases the files aren’t
released even if the payment is made.
Next-generation ransomware A threat that has never stopped evolving
01628 918300 | [email protected] | www.logrhythm.com
| 3
The wiper threat:
Although Petya/NotPetya looked a lot like traditional ransomware,
it was something perhaps ultimately more dangerous: a wiper.
Ransomware has always had profit as its goal but a subset of
malware writers is just as happy wreaking havoc as making money.
While Petya/NotPetya did have a ransomware component, it’s
thought that it was politically motivated and sought mainly to cause
economic damage by disabling vital systems – leaving organisations
caught in the crossfire.
Ransomware remains an issue for all organisations despite security
teams’ familiarity with the threat. But the evolution of new variants,
technologies and social engineering techniques means that security
operations should never become complacent. Ransomware is a quick
win for cyber criminals. If defences against traditional attacks can be
strengthened and staff better educated to be more resilient threat
actors will change and adapt their approach. They won’t be willing to
give up their payday so easily.
About LogRhythm
LogRhythm is the pioneer in Threat Lifecycle Management™ (TLM)
technology, empowering organisations on six continents to rapidly detect,
respond to and neutralise damaging cyberthreats. LogRhythm’s TLM
platform unifies leading-edge data lake technology, artificial intelligence,
security analytics and security automation and orchestration in a single
end-to-end solution. LogRhythm serves as the foundation for the AIenabled security operations centre, helping customers secure their cloud,
physical and virtual infrastructures for both IT and OT environments.
Among other accolades, LogRhythm is positioned as a Leader in
Gartner’s SIEM Magic Quadrant.
www.logrhythm.com
[1] Cyber-extortion losses skyrocket, says FBI http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/
[2] Cyber security breaches survey 2017 (Department for Culture, Media & Sport): https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_
Security_Breaches_Survey_2017_main_report_PUBLIC.pdf
Next-generation ransomware A threat that has never stopped evolving
01628 918300 | [email protected] | www.logrhythm.com
| 4
Please complete the form to gain access to this content