{"id":194407,"date":"2017-05-23T22:28:52","date_gmt":"2017-05-24T02:28:52","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/organizations-can-combat-wannacry-jaff-ransomware-with-well-instrumented-dns-techzone360\/"},"modified":"2017-05-23T22:28:52","modified_gmt":"2017-05-24T02:28:52","slug":"organizations-can-combat-wannacry-jaff-ransomware-with-well-instrumented-dns-techzone360","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/organizations-can-combat-wannacry-jaff-ransomware-with-well-instrumented-dns-techzone360\/","title":{"rendered":"Organizations Can Combat WannaCry &amp; Jaff Ransomware With Well Instrumented DNS &#8211; Techzone360"},"content":{"rendered":"<p><p>    The Infoblox Intelligence Unit observed two global malware    outbreaks on Friday, May 12.Although there is no    indication that the two attacks were related, both were    ransomware attacks with the goal of encrypting the victims    files and demanding payment (mostly in the form of a Bitcoin    payment) in order to decrypt them.  <\/p>\n<p>    Several reports conflated the two outbreaks based on the    evidence at hand and the common use of ransomware.    Subsequent investigation revealed that they were separate    attacks utilizing different distribution capabilities and    malware. It is important to understand the difference between    the two attacks because each one requires slightly different    remediation measures.  <\/p>\n<p>    The first attack, WannaCry, is a self-propagating worm, which    leverages a known and patched vulnerability in Microsoft Server    Message Block (SMB). It leverages an exploit called ETERNALBLUE    and goes on to establish a backdoor known as DOUBLEPULSAR to    allow for future access to the infected systems. WannaCry    spreads by connecting to SMB services on local and    Internet-facing systems with the vulnerability of running the    backdoor. The malware then spreads laterally by    attempting connections to all systems on the local network.  <\/p>\n<p>    During its initial infection, WannaCry checks whether an    external domain (killswitch domain) is available. If the    killswitch domain can be  <\/p>\n<p>    contacted, the encryption function does not run. The    killswitch domains are not a command-and-control server for the    malware and should be monitored but not blocked. Before May 12,    the domains were not registered. Shortly after the attack    started, amalware researcherregistered and    sinkholed the first domain. This helped prevent a lot of later    infections since the malware was able to resolve the domain. If    left to run normally, WannaCry will encrypt most files on a    machine. Once the files are encrypted, users will be prompted    to pay $300 in Bitcoin to get their files back. The cost goes    up to $600 if a user takes too long to pay, and eventually the    user will be unable to pay to have files returned. Note    that Microsoft had issued a patch for the SMB vulnerability    that was being exploited in March 2017. That patch was not    universally implemented.  <\/p>\n<p>    While the world was preoccupied with WannaCry, there was    another ransomware attack in progress called Jaff. The Jaff    ransomware was launched by Necurs, one of the largest botnets    in the world, notorious for spreading threats such as the Locky    ransomware and the Dridex banking Trojan. It sends misleading    emails to its victims encouraging them to open an attached PDF    document. This document asks for additional permissions when    opened and, if approved, allows the delivery and execution of    the ransomware payload. The emails used to deliver Jaff employ    standard spam techniques, but the exact details vary between    each of the concurrent campaigns.  <\/p>\n<p>    Once Jaff has been downloaded and executed by the malicious    document, it connects to its C2 servers to communicate that    encryption of the victims files has begun. Jaff then proceeds    to encrypt the victims files, instructs the victim to install    Tor Browser, and directs the users to a specific website that    displays a ransom note and payment instructions. The exact    amount demanded by the ransom varies over time, but currently    averages around 2 Bitcoin (roughly $3,500 dollars).  <\/p>\n<p>    Best Practice Recommendations  <\/p>\n<p>    In the face of these attacks, organizations in the Middle East    are asking what they can do.  <\/p>\n<p>    Edited by     Alicia Young<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.techzone360.com\/topics\/techzone\/articles\/2017\/05\/22\/432229-organizations-combat-wannacry-jaff-ransomware-with-well-instrumented.htm\" title=\"Organizations Can Combat WannaCry &amp; Jaff Ransomware With Well Instrumented DNS - Techzone360\">Organizations Can Combat WannaCry &amp; Jaff Ransomware With Well Instrumented DNS - Techzone360<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.Although there is no indication that the two attacks were related, both were ransomware attacks with the goal of encrypting the victims files and demanding payment (mostly in the form of a Bitcoin payment) in order to decrypt them.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/organizations-can-combat-wannacry-jaff-ransomware-with-well-instrumented-dns-techzone360\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-194407","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194407"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194407"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194407\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}