Australian Businesses Targeted by Ransomware

WHITE
CERT Australia
2012-78
Australian Businesses Targeted by
Ransomware
Abstract
CERT Australia has received reports of ransomware targeting Australian
businesses.
Ransomware is a type of software which restricts access to a victim
computer system, and demands a ransom be paid to the perpetrator in order
for the restriction to be removed.
This publication is provided to warn stakeholders of this activity and assist
businesses in detecting and mitigating malicious activity.
This document remains the property of the Australian Government. The information contained in this document is for the use of the intended recipient only
and may contain confidential or privileged information. If this document has been received in error, that error does not constitute a waiver of any
confidentiality, privilege or copyright in respect of this document or the information it contains. This document and the information contained herein cannot
be disclosed, disseminated or reproduced in any manner whatsoever without prior written permission from the Assistant Secretary, CERT Australia,
Attorney-General's Department, 3 - 5 National Circuit, Barton ACT 2600.
The material and information in this document is general information only and is not intended to be advice. The material and information is not adapted to
any particular person’s circumstances and therefore cannot be relied upon to be of assistance in any particular case. You should base any action you take
exclusively on your own methodologies, assessments and judgement, after seeking specific advice from such relevant experts and advisers as you consider
necessary or desirable. To the extent permitted by law, the Australian Government has no liability to you in respect of damage that you might suffer
that is directly or indirectly related to this document, no matter how arising (including as a result of negligence).
WHITE
WHITE
CA-2012-78
Handling Instructions
This bulletin is designated WHITE. WHITE Alerts are not confidential. They contain information that
is for public, unrestricted dissemination, publication, web-posting or broadcast. You may publish the
information, subject to copyright and any restrictions or rights noted in the information.
Background
CERT Australia has received reports of a ransomware campaign that is targeting Australian businesses.
Ransomware is a type of software which restricts access to a victim computer system, and demands a
ransom be paid to the perpetrator in order for the restriction to be removed.
Detail
CERT Australia has received reports of a number of small to medium businesses across a range of sectors
that have been victims of ransomware extortion. The perpetrators gain access to the system via Microsoft
Remote Desktop Protocol (RDP), possibly using authentication credentials obtained by key loggers, brute
forcing systems with weak credentials, or exploiting vulnerabilities in the RDP service.
The perpetrators then proceed to download tools to encrypt user files, including MYOB, PDFs and
Microsoft Office files that are required for normal business operations. The encryption process uses strong
encryption so that the files cannot be recovered without the decryption keys. The perpetrator demands
payment for access to these keys. Best practice is to not pay extortion attempts.
The attackers also use sdelete (secure delete) to wipe original files and backups that are connected to the
system; this means that the files are not recoverable using standard file recovery methods. It is important to
note that directly attached or network backups are rendered inaccessible.
The system will also display a fake lock screen that may claim that the victim’s computer has been
associated with criminal activity. This is a tactic to discourage the victim from reporting to law enforcement
agencies or CERT organisations. There are various themes used by the perpetrator for the fake warning
screen. For example, the perpetrator may claim to be from the Anti Cyber Crime Department of Federal
Internet Security Agency (ACCDFISA). There is no such agency.
WHITE
CA-2012-78
WHITE
CA-2012-78
Recommendations
CERT Australia suggests that stakeholders consider the following specific mitigations to protect against this
cyber security risk:
 Implement IP whitelisting for remote access connections.
 Use non-administrative accounts for remote access connections.
 Remove administrative accounts from the remote access group.
 Ensure that applications and operating systems are kept up-to-date with the latest software patches.
 Enforce strong password policies on user accounts to reduce the risk from brute forcing attempts.
 Make regular backups of important files and importantly store backups offline. The actors are
known to also encrypt or delete backups that are directly connected to the system or network.
 Implement account lockout policies on your remote access server to reduce the risk from brute
forcing attempts.
 Limit remote access connection attempts and log successful and failed connections.
 When remote access is required, use secure methods such as Virtual Private Networks (VPNs) with
two factor authentication and/or certificate based authentication for remote access.
 For other mitigation please refer to the “Strategies to mitigate targeted electronic intrusions” and
“Defence in Depth Principles” and “Resilient Backups” publications. [1]
Links
[1]
https://www.cert.gov.au/advisories
WHITE
CA-2012-78
WHITE
CA-2012-78
Feedback
CERT Australia is interested in any feedback that you may have with respect to this update and or the
service that we provide. If you would like to provide us with your comments, please do not hesitate to
e-mail us at [email protected] or contact us on 1300 172 499.
NOTE: Organisations should consider the sensitivity of information sent to this email address as it will be ‘in
the clear’ and not secure. If needed secure communication channels for sensitive or incident related
information are available on request.
Incident reporting
Stakeholders observing any activity connected to this publication are requested to contact CERT
Australia at [email protected] or 1300 172 499. This information is used to form an understanding of
Australia’s cyber threat context. All information is handled internal to the CERT and in strict
confidence. Secure communications mechanisms are available on request.
About CERT Australia
CERT Australia’s primary responsibility is to develop close working relationships with critical infrastructure
organisations and businesses that operate systems that are important to Australia’s national interest. In this
way, CERT Australia is able to help ensure that important services that all Australians rely on in their daily
lives are secure and resilient.
In addition to any internal or regulatory requirements that may be in place, CERT Australia stakeholders
can report cyber threats and incidents to CERT Australia on 1300 172 499. This telephone number assists
CERT Australia to rapidly respond to incidents impacting those services that are critical to all Australians.
Cyber crime involves the unauthorised access to or impairment of computer systems and is likely to
constitute an offence under the Commonwealth’s Criminal Code Act 1995 and/or State and Territory
criminal laws. If CERT Australia stakeholders suspect that they have been the victim of cyber crime they
should report it to the Australian Federal Police.
WHITE
CA-2012-78
CERT Australia
SENSITIVE INFORMATION TRANSMISSION
Restrictions on Access and Use
Traffic Light Protocol
TLP CLASSIFICATION
RESTRICTIONS ON ACCESS AND USE
Highly Restricted
Access to and use by your CERT Australia Security Contact
Officer only.
RED
You must ensure that your CERT Australia Security Contact Officer
does not disseminate or discuss the information with any other
person, and you shall ensure that you have appropriate systems in
place to ensure that the information cannot be accessed or used by
any person other than your CERT Australia Security Contact Officer.
Restricted internal access and use only.
AMBER
Subject to the below, you shall only make ‘AMBER’ Alerts available
to your employees on a “needs to know basis” strictly for your
internal purposes only to assist in the protection of your information
and communications technology (ICT) systems.
In some instances you may be provided with ‘AMBER’ Alerts which
are marked to allow you to also disclose it to your contractors or
agents on a “needs to know basis” strictly for your internal purposes
only to assist in the protection of your ICT systems.
Restricted to closed groups and subject to confidentiality
GREEN
You may share ‘GREEN’ Alerts with external organisations,
information exchanges or individuals in the network security,
information assurance or critical network infrastructure community
that agree to maintain the confidentiality of the information in the
Alert.
You may not publish or post on the World Wide Web or otherwise
release it in circumstances where confidentiality may not be
maintained.
Not restricted
WHITE
NOT CLASSIFIED
‘WHITE’ Alerts are not confidential. They contain information that is
for public, unrestricted dissemination, publication, web-posting or
broadcast. You may publish the information, subject to copyright and
any restrictions or rights noted in the information.
Any information received from CERT Australia that is not classified in
accordance with the Traffic Light Protocol must be treated as
‘AMBER’ classified information unless otherwise agreed in writing by
the Attorney-General’s Department.