Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

DHS Says SamSam Ransomware is Targeting Critical Infrastructure Entities

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) this week issued an alert on activity related to SamSam, one of the most prevalent ransomware families at the moment. 

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) this week issued an alert on activity related to SamSam, one of the most prevalent ransomware families at the moment. 

Associated with numerous attacks on health, education and government organizations, SamSam was recently said to have impacted the private sector the most. Over the past couple of years, the actor behind the malware supposedly netted more than $5.9 million.

Last week, the U.S. Department of Justice charged two Iranian men – Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri – over their alleged role in the development and distribution of SamSam for extortion purposes. 

In the newly published activity alert, the DHS and the FBI note that the SamSam operators targeted multiple industries, including entities within critical infrastructure. Most of the victims were located in the United States, the alert says. 

The reason the actors are targeting organizations is that network-wide infections are more likely to garner large ransom payments when compared to infections of individual systems. Furthermore, organizations are more likely to pay large ransom amounts as they need to resume operations quickly.

To gain persistent access to a victim’s network, the actors target vulnerabilities in Windows servers. In early 2016, they were targeting vulnerable JBoss applications, but in mid-2016 they started using Remote Desktop Protocol (RDP) for their attacks, via brute force or stolen credentials. 

Once inside a network, the alert reveals, the actors escalate privileges for administrator rights, after which they drop and execute malicious files onto the server, without victims’ action or authorization. The use of RDP eliminates the need for user interaction to execute the ransomware and also ensures the attack remains undetected. 

According to the alert, the SamSam operators appear to have purchased stolen RDP credentials from known darknet marketplaces. The investigation into attacks revealed that the actors can infect a network within hours of purchasing the credentials. 

Advertisement. Scroll to continue reading.

The SamSam actors leave ransom notes on the encrypted machines, to instruct victims into contacting them through a Tor hidden service site. They also demand a ransom be paid in Bitcoin, in exchange for which the actors provide victims with links to download cryptographic keys and tools to decrypt their network.

The DHS National Cybersecurity and Communications Integration Center (NCCIC) also published a series of malware analysis reports detailing four SamSam malware variants. 

The DHS and FBI alert also includes a series of mitigation recommendations, such as auditing the network for systems that use RDP, ensuring that cloud-based virtual machine instances with public IPs have no open RDP ports, using strong passwords and two-factor authentication, keeping systems updated, and maintaining a good back-up strategy, among others. 

Related: U.S. Charges Two Iranians Over SamSam Ransomware Attacks

Related: SamSam and GandCrab Illustrate Evolution of Ransomware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.