{"id":23322,"date":"2021-08-25T19:42:23","date_gmt":"2021-08-25T18:42:23","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/please-install-ransomware\/23322\/"},"modified":"2021-08-25T19:42:23","modified_gmt":"2021-08-25T18:42:23","slug":"please-install-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/please-install-ransomware\/23322\/","title":{"rendered":"Please encrypt your server"},"content":{"rendered":"<p>When ransomware enters a corporate network, it usually does so through e-mail, software vulnerabilities, or unprotected remote connections. Having an insider deliberately deploy malware seems implausible. However, as <a href=\"https:\/\/threatpost.com\/nigerian-solicits-employees-ransomware-profits\/168849\/\" target=\"_blank\" rel=\"nofollow noopener\">real-world evidence<\/a> shows, some attackers think this method of delivering ransomware is effective, and some attackers are now recruiting company employees by offering them a percentage of the ransom.<\/p>\n<h2>A creative delivery scheme<\/h2>\n<p>As absurd as it may sound, some seek out accomplices through spam. For example, one message directly offers \u201c40%, $1 million in bitcoin\u201d to anyone willing to install and deploy DemonWare ransomware on their organization\u2019s main Windows server.<\/p>\n<p>Researchers masquerading as interested accomplices received a link to a file along with instructions for launching the malware. However, the person behind the mailing was apparently an inexperienced cybercriminal; the researchers had no trouble getting him to talk. The threat actor in question was a young Nigerian man who had scoured LinkedIn, looking for senior executives to contact. He abandoned his original plan \u2014 e-mailing malware \u2014 once he realized how strong corporate cybersecurity systems are.<\/p>\n<h2>What\u2019s wrong with the scheme?<\/h2>\n<p>To convince his targets their participation would be safe, the threat actor claimed the ransomware would erase all evidence of the crime, including any potential security footage, and recommended deleting the executable file to avoid leaving any clues. One might expect the criminal planned to trick his accomplices \u2014 arguably, once the server was encrypted, he would not care what happened to the person who did it \u2014 but he doesn\u2019t appear to have understood how digital forensics investigations \u00a0work.<\/p>\n<p>The decision to use DemonWare also betrayed his inexperience. Although attackers do still use DemonWare, it is actually rather unsophisticated malware whose source code is available on GitHub. The malware\u2019s creator allegedly made it to demonstrate how easy it is to write ransomware.<\/p>\n<h2>How to stay safe<\/h2>\n<p>Although this example is just that \u2014 one specific example \u2014 insiders taking part in a ransomware attack is entirely realistic. Far more likely than someone launching malware on a network, however, is a scenario in which someone sells access to an organization\u2019s information system.<\/p>\n<p>The market for access to corporate networks has long existed on the dark web, and ransomers often <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-operators-love-them-key-trends-in-the-initial-access-broker-space\/\" target=\"_blank\" rel=\"nofollow noopener\">purchase<\/a> access from other cybercriminals \u2014 so-called Initial Access Brokers. It\u2019s they who may be specifically interested in buying data for remote access to the organization\u2019s network or cloud servers. Ads for such purchases aimed at disgruntled or fired employees float around the dark web.<\/p>\n<p>To ensure no one jeopardizes your company\u2019s security by letting ransomers into its networks, we recommend you:<\/p>\n<ul>\n<li>Adopt a strategy of least privilege;<\/li>\n<li>Keep careful records of access attempts to the organization\u2019s network and servers, and revoke rights and change passwords when employees are dismissed;<\/li>\n<li>Install on every server <a href=\"https:\/\/www.kaspersky.co.uk\/small-to-medium-business-security?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> that can counter today\u2019s malware;<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.co.uk\/enterprise-security\/managed-detection-and-response?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response<\/a> solutions, which help identify suspicious activity in your infrastructure before attackers have a chance to inflict serious damage.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Would you encrypt your own server for a cut of the ransom?<\/p>\n","protected":false},"author":2581,"featured_media":23323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2360,2361],"tags":[1467,1859,441],"class_list":{"0":"post-23322","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-access","11":"tag-employees","12":"tag-ransomware"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/please-install-ransomware\/23322\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/please-install-ransomware\/23217\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/please-install-ransomware\/18704\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/please-install-ransomware\/9347\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/please-install-ransomware\/25253\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/please-install-ransomware\/22689\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/please-install-ransomware\/25877\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/please-install-ransomware\/25388\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/please-install-ransomware\/31357\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/please-install-ransomware\/9966\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/please-install-ransomware\/41419\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/please-install-ransomware\/17524\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/please-install-ransomware\/18014\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/please-install-ransomware\/15176\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/please-install-ransomware\/27243\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/please-install-ransomware\/31506\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/please-install-ransomware\/27451\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/please-install-ransomware\/24266\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/please-install-ransomware\/29591\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/please-install-ransomware\/29396\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/23322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=23322"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/23322\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/23323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=23322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=23322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=23322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}