Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Attackers Leave Server Credentials in Ransomware’s Code

Ransomware is currently one of the largest cyber-threats out there, affecting enterprises and individuals alike, but every now and then the cybercriminals behind such malicious applications make critical mistakes.

Ransomware is currently one of the largest cyber-threats out there, affecting enterprises and individuals alike, but every now and then the cybercriminals behind such malicious applications make critical mistakes.

Recently, Trend Micro researchers encountered SNSLocker, a piece of ransomware that didn’t stand out in the crowd because of its interface or routine. The malware did, however, get special attention because of an error that its authors made. Specifically, the developer(s) included the credentials for the access to their server in the ransomware’s code and forgot to remove them before beginning their infection campaign.

As it turns out, this was only one of the errors these cybercriminals made, as they also used readily-available servers and payment systems in their campaign. This reveals that they were in a hurry to setup a system for massive infection and then see a quick return of income, Trend Micro researchers say.

The recent proliferation of ransomware-as-a-service has allowed almost anyone to become a cybercriminal, yet this business model comes with its own caveats. Because attackers are in such a hurry to see their investment return profits, they focus less on securing the malicious application or other resource they use.

Leaving credentials out in the open and having them shared in social media by security researchers is a major mistake that the malware authors might have made because they lacked advanced skills. According to security researchers, SNSLocker has a coarse and bland interface and packs features already seen in most crypto-ransomware families out there.

The malware’s encryption capabilities were common to other ransomware, and the payment link and the ransom amount (in this case $300) didn’t stand out either. Trend Micro researchers also explain that the malware is written in pure .Net Framework 2.0, that it features several popular libraries such as Newtonsoft.Json and MetroFramework UI, and that it also leverages on Microsoft .Net Crypto API.

In addition to the aforementioned server login credentials, the ransomware’s code also included strings that provided information on the location of the server. Not only did this provide access to the server, but also to the decryption key, as it was included in the publicly accessible data, researchers say.

The SNSLocker operators used a free hosting provider as the ransomware’s command and control (C&C) and payment server, so that the costs related to maintaining the account would be minimal. Furthermore, the operators didn’t invest time in customizing the payment process either, but went for a legitimate crypto-currency gateway to accept payments instead.

Advertisement. Scroll to continue reading.

Despite these errors, the ransomware managed to infect computers all around the world, but focused mainly on users in the United States. Because it is a global threat, SNSLocker proves that ransomware is rampant, given that cybercriminals can easily setup infection and payment systems and can target people around the world in no time.

Unfortunately, some of the dominating ransomware families in the wild do not suffer from the weaknesses that plague SNSLocker. Threats such as Cerber receive constant updates that improve their functionality and help them better evade security programs. Petya and Locky are other examples of well-written and constantly maintained threats.

Related: Ransomware: Four Ways to Assess This Growing Threat as a Business Risk

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.