Skip to content

Latest commit

 

History

History
141 lines (101 loc) · 3.9 KB

42-usecase_ransomware.md

File metadata and controls

141 lines (101 loc) · 3.9 KB
SPDX-FileCopyrightText SPDX-License-Identifier title author footer description keywords color class style
© 2024 Menacit AB <foss@menacit.se>
CC-BY-SA-4.0
Practical cryptography course: Cryptography in ransomware
Joel Rangsmo <joel@menacit.se>
© Course authors (CC BY-SA 4.0)
Use-cases of cryptography in ransomware
cryptology
cryptography
practical
encryption
course
#ffffff
invert
section.center { text-align: center; } table strong { color: #d63030; } table em { color: #2ce172; }

Ransomware

Use-case study of cryptography

bg right:30%


What is ransomware?

Malware that makes files/data inaccessible, typically using encryption.

Intruders demand payment to release files/data.

Global ransomware damages are estimated to exceed $30 billion by 2023.

Acronis 22

bg right:30%


What makes it a good showcase?

Basically all cryptography techniques we've talked about are involved.

bg right:30%


Let's dig in!

bg right:30%


Initial access / intrusion

The malicious code needs to be deployed somewhere, preferably on a business critical system.

Initial access brokers specialize in selling access to user accounts and systems.

Foothold is usually obtained by:

  • Credential phishing
  • Password leaks and reuse
  • Exploitation of vulnerable systems

bg right:30%


Bypassing security controls

Various different methods to stay under the radar and avoid detection.

One is to steal or fraudulently obtain code-signing certificates.

bg right:30%


Increasing recovery cost

Delete/corrupt backup archives.

Steal sensitive/embarrassing information for "double extortion".

Target firmware/lower-level code that is tricky to recover from.

bg right:30%


Encrypting the data

Symmetric encryption of (all) files.

(En|De)cryption key is encrypted against intruder's public key.

Commonly use established standards such as AES and RSA.

Commonly use the same cryptography libraries as everyone else - crypto is hard.

bg right:30%


Establishing contact

So-called "ransom notes" are left of the affected systems.

Instructions describing how victims can get their data back.

Typically contains an .onion-link for more details, payment information and "customer support".

bg right:30%


Getting paid

Ransom must typically be paid in a cryptocurrency.

Bitcoin and Monero are the most common options.

Cashing out safely is not easy, requires tumbling and trickery.

bg right:30%


Things are getting... better?

Organizations take security and disaster recovery way more serious these days.

RaaS is enabling specialization.

Cyber insurance has interesting side-effects.

bg right:30%