{"id":3180,"date":"2018-11-12T01:06:59","date_gmt":"2018-11-12T01:06:59","guid":{"rendered":"http:\/\/genesissystem.com\/new\/?p=3180"},"modified":"2018-11-12T01:06:59","modified_gmt":"2018-11-12T01:06:59","slug":"dealing-with-ransomware-and-remote-access-hacking","status":"publish","type":"post","link":"https:\/\/genesissystem.com\/new\/dealing-with-ransomware-and-remote-access-hacking\/","title":{"rendered":"Dealing with ransomware and remote access hacking"},"content":{"rendered":"<p><strong>Dealing with ransomware and remote access hacking<br \/>\n<\/strong><br \/>\nNetSafe has received reports from New Zealand SMEs affected by a particularly effective form of ransomware called Anti-Child Porn Spam Protection.<\/p>\n<p>This form of malware is targeted at Windows servers and takes a system and any data stored on it hostage in an attempt to extort money.<\/p>\n<p>Companies affected by the malware have found their systems locked out with all business and customer data encrypted by a hacker and a demand for payment of up to several thousand dollars to unlock the files affected.<\/p>\n<p>The ransomware also suggests the systems have been spamming or contain child pornography and unless the ransom is paid a report will be made to the FBI.<\/p>\n<p><strong>How are companies affected?<\/strong><br \/>\nNZ-Police-ransomware-screenshot<\/p>\n<p>A screenshot shows an example ransomware lockout featuring the NZ Police logo<\/p>\n<p>Instead of using drive-by download websites to exploit browser vulnerabilities, it would appear these latest ransomware infections are manually installed by a remote attacker using a tool named DUBrute against vulnerable Remote Desktop Protocol (RDP) connections on port 3389.<\/p>\n<p>The tool undertakes dictionary attacks against common user accounts including admin, Administrator, backup, console, Guest, sales, user and many more.<\/p>\n<p>If access is gained the attacker can disable anti-virus software and executes malware on the system that displays a ransom notice, locks genuine users out, deletes backups and encrypts any data found.<\/p>\n<p>There have been recent media reports of companies in Australia paying the ransom to gain access back to their data.<br \/>\nHow can I defend against this ransomware?<\/p>\n<p>    Backup Everything<br \/>\n    It is essential that companies make regular routine backups with data stored offsite as there is currently no known way to decrypt the files affected by the malware<br \/>\n    Use Strong Passwords<br \/>\n    Make sure you have a proper password policy in place for all user accounts with remote access \u2013 review all system accounts and delete any that are no longer required<br \/>\n    Consider disabling remote access<br \/>\n    If you do not need remote access then consider disabling Remote Desktop or Terminal Services, close port 3389 or use IP based restrictions or a VPN.<br \/>\n    Update Everything<br \/>\n    Check the Microsoft Security Bulletins and ensure your systems are fully patched against known RDP vulnerabilities<br \/>\n    Alert others to prevent more attacks<br \/>\n    Please forward this email to colleagues, friends and family who could be impacted by a ransomware infection at their company<\/p>\n<p><strong>What do I do if my company is infected?<\/strong><\/p>\n<p>    Report the computer system attack<br \/>\n    Make a report to NetSafe\u2019s ORB website - we have been communicating with the National Cyber Security Centre about recent incidents<br \/>\n    Be prepared to wipe systems and restore from backups<br \/>\n    IT staff we have spoken with have spent several days dealing with the fallout from these infections<br \/>\n    Do not pay the ransom<br \/>\n    Some companies affected have been forced to pay to have their data unlocked by the hacker \u2013 NetSafe would encourage you to not to follow this path<\/p>\n<p><strong>More help and advice:<\/strong><\/p>\n<p>    New ransomware called Anti-Child Porn Spam Protection<br \/>\n    The Bleeping Computer forum thread with comments from the alledged ransomware creator on how the encryption cannot be broken<br \/>\n    Hackers ransom $3000 from NT business<br \/>\n    SC Magazine report from last week on an Australian business forced to pay a $3000 ransom to hackers who had encrypted its financial records.<br \/>\n    The ACCDFISA malware family \u2013 Ransomware targeting Windows servers<br \/>\n    A very detailed technical look at how systems are affected by the ransomware.<br \/>\n    Close port 3389 (Remote Desktop) on your firewalls NOW<br \/>\n    An American blog on how two small companies lost data to the ransomware and advice on locking out failed password attempts.<br \/>\n    Microsoft Security Bulletins<br \/>\n    Search security bulletins for your company systems and ensure you remain fully patched.<br \/>\n    NetSafe Security Central<br \/>\n    Cyber security advice for New Zealand SMEs<br \/>\n    Report cyber incidents to the Orb website<br \/>\n    Attacks on computer systems can be reported at www.theorb.org.nz and we will work with NCSC to respond<br \/>\n    Watch Paul Ducklin from Sophos<br \/>\n    His YouTube video discusses another form of ransomware called Reveton that can be cleaned from computers:<\/p>\n<p><iframe loading=\"lazy\" width=\"604\" height=\"340\" src=\"https:\/\/www.youtube.com\/embed\/-qR3D-Jx6FQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dealing with ransomware and remote access hacking NetSafe has received reports from New Zealand SMEs affected by a particularly effective form of ransomware called Anti-Child Porn Spam Protection. This form of malware is targeted at Windows servers and takes a system and any data stored on it hostage in an attempt to extort money. Companies affected by the malware have&nbsp;<a href=\"https:\/\/genesissystem.com\/new\/dealing-with-ransomware-and-remote-access-hacking\/\" class=\"read-more\">Continue Reading<\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/posts\/3180"}],"collection":[{"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/comments?post=3180"}],"version-history":[{"count":1,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/posts\/3180\/revisions"}],"predecessor-version":[{"id":3181,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/posts\/3180\/revisions\/3181"}],"wp:attachment":[{"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/media?parent=3180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/categories?post=3180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/genesissystem.com\/new\/wp-json\/wp\/v2\/tags?post=3180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}