Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Atlanta Counting on Backups, Cloud to Recover from Ransomware Attack

    Written by

    Wayne Rash
    Published March 24, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The ransomware that has taken out many of the computers in the Atlanta, Ga. is well known by security researchers as the SamSam malware. It appears to be run by a single group of bad actors who use a common Bitcoin wallet and who are very effective at convincing their victims to pay up. 

      “SamSam is a ransomware controlled by a single threat group,” explained Keith Jarvis, a researcher with Secureworks Counter Threat Unit. “It’s unlike other ransomware that’s out there.” What makes SamSam different is in the way the attacks develop. 

      According to Jarvis, the attackers scan for open ports, typically a Windows RDP (Remote Desktop Protocol) port, and then apply a brute force attack until they get in. A brute force attack means that they’ll constantly hit the port with credentials until one works. Once they succeed, they’re inside the system. 

      Once inside, they’ll examine the target network looking for important assets, such as servers containing significant data. “Once they’ve identified important assets they deploy ransomware to those specific machines,” Jarvis said. 

      Eugene Weiss, head of content security intelligence engineering for Barracuda Networks, explained what happens next. The SamSam malware looks for certain critical files. It encrypts them with AES 256-bit encryption, and asks for a Bitcoin to be sent to a Bitcoin wallet.” 

      Weiss said that there’s no guarantee that the SamSam threat actors will actually go through with their offer to decrypt the files once they’ve received their Bitcoins, but they may. Jarvis said that this particular set of threat actors will typically demonstrate that they are have control of critical files by decrypting a few of them. 

      Jarvis said that the attackers in the Atlanta case are asking for six Bitcoins, which comes out to about $51,000.00. But that could change once the victim indicates a willingness to pay. “Sometimes this actor will renegotiate the ransom even higher,” he said. 

      So far, it seems, the attacker running the SamSam ransomware have been decrypting the servers they’ve attacked after they’ve been paid. From their viewpoint this is important, because if they get the reputation of refusing to do so, nobody will pay the ransom. 

      The attackers only seem to be after the ransom. “We’ve never found any evidence that they’re interested in stealing any data,” Jarvis said. “Their MO is exclusively to get in there and spread ransomware.” 

      Atlanta city officials haven’t indicated whether they’re planning to pay the ransom, or try to regain control of their data systems without doing so. In Atlanta’s case, however, they appear to be in good position to recover. 

      According to reports from Atlanta, the city’s IT department had been careful in backing up their critical data. Furthermore the city has moved much of their critical services to the cloud. The city’s network also appears to have been properly segmented, so public safety and the airport were not affected. 

      So how did this happen? According to Sam Elliott, director of security product management with remote security services provider Bomgar in Atlanta, said it’s apparent that ‘there’s some pretty bad hygiene of open ports there,” he said. “What probably caused this is a port that should not have been open.” 

      Elliott said that there are indications that it was probably an public facing RDP port, although he said it could also have been an SMB port. He said that finding such ports is relatively easy using the Shodan network browser. Elliott said that what typically happens is that a port is opened for a specific purpose, such as for a support call, and then left open because someone forgot to close it. 

      Jarvis said that right now the city’s IT folks are deciding on the approach to take. “They’re going through the calculus of ‘can we recover’ without having to pay the ransom.” 

      Whether they can depends on whether the backups are saved properly. If they can, then they don’t need to pay the ransom. “If they backed up their data, that’s the only way to recover from a ransomware attack,” Weiss said. 

      Once the city recovers from the ransomware attack, the next step is what to do to keep it from happening again. Here’s what Jarvis recommends: 

      • Turn off RDP. It should never be used on any public facing port and its use should be discouraged anywhere else on a network.
      • Turn on two-factor authentication. Brute force credential attacks won’t work if two-factor authentication is in place.
      • Perform regular audits of your external network for open remote access ports. You can use the Shodan browser for this.
      • Have robust credentials. Weak credentials make a break-in easier and faster.
      • Use whitelisting. That means keep a list of the sites on the internet where users are allowed to go, and a list of what sites can have access to your network. 

      Weiss adds a couple more suggestions: 

      • Never allow Windows shares on the public network.
      • Patch religiously. While you need to confirm that a patch will work, it’s critical to apply it promptly. The practice of delaying patches for months or forever is certain to cause problems.
      • Finally, train your employees to recognize threats such as phishing emails. “It’s time that anyone who touches a computer ought to be trained about social engineering,” he said. 

      Following security best practices will help most organizations avoid ransomware, but those practices have to be more than just lip service. 

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.