Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Malware ‘Crysis’: New Strain Combines Multiple Threats, Platforms

    Written by

    Wayne Rash
    Published June 9, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In some ways, the latest variation of Crysis (or Crisis, depending on whom you ask) malware either provides something for everyone, or it’s a nightmare scenario, depending on how you look at it. When Crysis first came to light, it was a fairly typical, if annoying, form of ransomware. It would encrypt some files and then demand ransom, ostensibly offering to decrypt those files if you paid.

      Things have changed. Following a series of monthly updates, this malware is now able to exfiltrate critical files and user information, gain administrator rights to the computer it’s infecting and take over as an admin user. It also doesn’t matter if the computer is a PC or a Mac because Crysis can infect either platform, and once inside a network, it can also attack virtual machines and any server visible to the computer it’s on.

      Complicating matters, the Crysis malware that’s out now doesn’t attack any OS vulnerabilities. According to a study by Symantec, the malware is inserted using a Java applet dropper. Normally, Java applets can’t access machine resources, but in this case, the attack includes sophisticated social engineering intended to get the machine’s user to allow it to have full access to the system.

      Once installed on a machine, the Crysis malware can use a variety of self-running files to spread to other machines, including Windows Phone devices and other computers on the same network. Right now, the malware can only attack certain virtual machines (VMs) from VMware, but not other VMs, but there’s no reason this can’t be extended.

      Adding to the misery, the Crysis malware also copies the admin login information for any computer it attacks to its command-and-control server, allowing that machine and others to be attacked as long as the credentials haven’t been changed. And if that’s not enough, the bad guys have now raised their ransoms from a few hundred bucks to levels well in excess of $20,000. And, of course, there’s no assurance that they will actually deliver the decryption keys or remove the malware.

      Fortunately, you don’t need to pay the ransom to recover, and you don’t need to be infected if you’re careful and follow some common-sense security guidelines. First, a good anti-malware package will detect the actions of the Crysis malware once it starts trying to infect a computer, even if the initial Java applets go undetected (which is what they’re designed to do). Second, you can recover using backups.

      Unfortunately, the malware developers aren’t resting. “What we see with most malware is that there is furious innovation,” said Stu Sjouwerman, CEO of Knowbe4. “They’re using Agile development techniques with monthly releases.”

      The rapid development is a result of competition, Sjouwerman said. “They’re adding new features at a very rapid clip because they’re fighting for criminal market share.”

      While new versions of Crysis and other malware products are coming out rapidly, the creators of these packages are doing their best to hide the details, he said. “It is very hard to identify different versions; they’re trying to obfuscate those versions” to keep other criminals off balance, he said.

      Malware ‘Crysis’: New Strain Combines Multiple Threats, Platforms

      The ability to attack VMs is especially worrisome because it opens a new layer of attack and data breach for companies, Sjouwerman said. In the past, malware avoided VMs because they might be sandboxes designed to trap malware so it could be studied, he said. Now, it appears that getting access to the data on those VMs is worth the risk.

      Still, there are some actions you can take that will help keep Crysis or other malware like it at bay. Here are some suggestions from Sjouwerman:

      You need what he calls “weapons-grade backups.” You must be making real-time copies of your critical files, and you’re able to revert over the last few minutes. You have to have a very recent version on which you can fall back. Once a day isn’t good enough.

      You have to patch religiously, Sjouwerman said. This means the OS and all third-party applications must be kept up-to-date constantly to eliminate any vulnerabilities. And you need to get rid of Flash, which no longer needs to exist, and which is a mass of vulnerabilities.

      Additionally, you have to start doing what Sjouwerman calls “new-school” security-management training. Getting everyone in a conference room once a year, plying them with coffee and donuts, and resorting to Death by PowerPoint doesn’t work anymore, he said. You have to make employees aware of the risks, and keeping the training fresh is critical, Sjouwerman said. “Send them frequent simulated phishing attacks.”

      It’s critical to know that Crysis works so well because it neatly avoids most technological methods of detecting malware and, instead, depends on social engineering. This also means that your employees are subject to a growing, ever more sophisticated level of attacks through their email and social media contacts. It is possible to manage this threat by limiting access to social media from the company network and by setting policies limiting personal email use. However, neither of those strategies is foolproof.

      It’s also critical to start making your network hard to infect through segmentation and other means, if only because malware can’t infect what it can’t see.

      The new malware threats are the most serious ever, but you can assume that the worst is yet to come. The competition and rapid development will ensure that attacks will rain down on your company without letup. The only thing you can do is train your staff, and take precautions that will never stop. Well, there is one other thing—you can decide to go out of business instead.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×