European companies hit with highly customizable ransomware
Panda Security researchers have been following and analyzing ransomware attacks that have been targeting European business for a few months now, and have tied them to the same group.
Their modus operandi is simple: they brute-force their way into companies’ Internet-facing remote desktop protocol (RDP) servers, and use the access these servers give them to target specific computers on the company network.
What’s interesting about these attacks is that the attackers are deploying a ransomware tool with a easy-to-use graphical interface to configure each attack leveraged against these machines.
Through it, the attackers can chose which contact email to provide to the victim in the ransom message, which files and folders will be encrypted, whether the malware will autodelete after the encryption process, and so on (see image above).
These attacks are a definite indication that the Ransomware-as-a-Service trend is gaining momentum, and ransomware-wielding crooks don’t need to be extremely skilled to perform the attacks.
In these specific cases, securing RDP servers is critical, and can be done by either making them inaccessible from the Internet, or by employing long and hard-to-guess passwords and two factor authentication for user accounts with remote access. Encrypting the remote connection is also a good idea.
Vulnerable RDP servers provide attackers with a perfect staging point within the organization’s network. From there, they can find more information about the machines on the network, and make a more informed decision about which of them hold information and files that are crucial for the firm.
This type of approach is not new but, unfortunately, it is still very effective.