If you’re in tech, you will have heard about the WannaCry/WannaCrypt ransomware doing the rounds. The infection started on Friday May 12th 2017 by exploiting MS17-010, a Windows Samba File Sharing vulnerability. The virus exploited a known vulnerability, installed a cryptolocker and extorted the owner of the Windows machine to pay ransom to get the files decrypted.
As far as worms go, this one went viral at an unprecedented scale.
But there are some design decisions in this cryptolocker that prevent it from being much worse. This post is a thought exercise, the next vulnerability will probably implement one of these methods. Make sure you’re prepared.
Time based encryption
This WannaCry ransomware found the security vulnerability, installed the cryptolocker and immediately started encrypting the files.
Imagine the following scenario;
- Day 1: worm goes round and infects vulnerable SMB, installs backdoor, keeps quiet, infects other machines
- Day 14: worm activates itself, starts encrypting files
With WannaCrypt, it took a few hours to reach world-scale infections, alerting everyone and their grandmother that something big was going on. Mainstream media picked up on it. Train stations showed cryptolocker screens. Everyone started patching. What if the worm gets a few days head start?
By keeping quiet, the attacker risks getting caught, but in many cases this can be avoided by excluding known IPv4 networks for banks or government organizations. How many small businesses or large organizations do you think would notice a sudden extra running .exe in the background? Not enough to trigger world-wide coverage, I bet.
A variation to the scenario above;
- Day 1: worm goes round, exploits SMB vulnerability, encrypts each file, but still allows files to remain opened (1)
- Day 30: worm activates itself, removes decryption key for file access and prompts for payment
How are your back-ups at that point? All files on the machine have some kind of hidden time bomb in them. Every version of that file you have in back-up is affected. The longer they can keep that hidden, the bigger the damage.
More variations of this exist, with Excel or VBA macro’s etc, and all boil down to: modify the file, render it unusable unless proper identification is shown.
(1) This should be possible with shortcuts to the files, first opening some kind of wrapper-script to decrypt the files before they launch. Decryption key is stored in memory and re-requested whenever the machine reboots, from its Command & Control servers.
Extortion with your friends
The current scheme is: your files get encrypted, you can pay to get your files back.
What if it’s not your own files you’re responsible for? What if are the files of your colleagues, family or friends? What if you had to pay 300$ to recover the files from someone you know?
Peer pressure works, especially if the blame angle is played. It’s your fault someone you know got infected. Do you feel responsible at that point? Would that make you pay?
From a technical POV, it’s tricky but not impossible to identify known associates for a victim. This could only happen a smaller scale, but might yield bigger rewards?
Cryptolocker + Windows Update DDoS?
Roughly 200.000 affected Windows PCs have been caught online. There are probably a lot more, that haven’t made it to the online reports yet. Those are quite a few PCs to have control over, as an attacker.
The media is now jumping on the news, urging everyone to update. What if the 200k infected machines were to launch an effective DDoS against the Windows Update servers? With everyone trying to update, the possible targets are lowering every hour.
If you could effectively take down the means with which users can protect themselves, you can create bigger chaos and a bigger market to infect.
The next cryptolocker isn’t going to be “just” a cryptolocker, in all likeliness it’ll combine its encryption capacities with even more damaging means.
How to prevent any of these?
- Enable auto-updates on all your systems (!!)
- Have frequent back-ups, store them long enough
Want more details? Check out my earlier post: Staying Safe Online – A short guide for non-technical people.