Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Watch Out for Fileless Ransomware

At a recent industry conference I heard some commentary about the “disappearance” of ransomware, but I’m here to assure you that that isn’t the case.

At a recent industry conference I heard some commentary about the “disappearance” of ransomware, but I’m here to assure you that that isn’t the case. It’s true that some criminal gangs have switched to distributing cryptocurrency miners instead of ransomware (for now, I emphasize), as such mining is currently more difficult for many security systems to detect, and it’s proving extremely profitable to the criminals, which is all that matters.

A May survey showed phishing has surpassed ransomware as a concern for IT security managers, and for understandable reasons—the number of phishing emails reaching users keeps rising, and phishing is the top source of breaches at companies. 

But don’t think ransomware is going to go quietly or go away at all. The narrative of the decline of ransomware is being driven in part by the decrease in mass, botnet-driven mailings sent in the tens of millions, which are spectacular and generate headlines. But it’s important to balance that narrative, focused on the decline in the sheer volume of ransomware distributions, with the understanding that during this past year there has also been an increase in the overall number of ransomware variants in circulation and more varied distribution methods in use, with each campaign typically targeting smaller audiences in the tens of thousands. 

Ransomware Not Dead, Just Less Open

Also consider that other factors are making ransomware activity less obvious and tracking it more difficult. There is a shift underway away from Bitcoin to cryptocurrencies that are even more private — Monero and Dash wallets aren’t open, we can’t any longer just look at publicly visible Bitcoin wallets and see ransomware at work. That switch is also being pushed by Bitcoin-to-dollar currency exchange platforms being shut down, like a Russian bitcoin platform which was recently seized. The move to better hide the payment trail extends to a trend in ransomware notes, which less frequently contain explicit payment instructions, but have switched to use of email or “bitmessaging” to communicate the payment details. In any event, the criminals realized that being brazenly open in this way was best avoided.

Fileless Ransomware Living Off the Land

What’s referred to as “fileless” malware is being seen a lot, and my colleagues and I have been discussing why it hasn’t crossed over more heavily into ransomware yet. When it does, it will get through a lot of industry defenses. To recap, “fileless” refers to methods and capabilities that, in order to evade detection, curtail the number of malicious artefacts written to the file system. This is made possible by applying the principle of “living off the land,” where pre-installed system tools like Powershell and PsExec, with their powerful capabilities and privileges, are leveraged to execute the malicious payload, instead of the ransomware code bringing along a lot of heavy baggage. At this point, all the major ransomware families (Cerber, GrandCrab, Locky, et al.) have had “living off the land” capabilities added to them, mostly by embedding Powershell scripts that download and execute the payload. Powershell and other system tools can also be used for the ransomware encryption itself, as first seen in Poshcoder in 2014 (which, because of poor programming, destroyed the files in the encryption process…), and later in its “improved” version, Powerware. 

Combined, living-off-the-land and fileless injection methods create the potential to launch an attack where no malicious executable is ever saved to disk. Fully “fileless” attacks are by nature volatile and will not survive a reboot or removal. The problem with ransomware is that it has no need for persistence. Running it once is enough for cybercriminals to reach their goals.

Advertisement. Scroll to continue reading.

Most Next Big Things Have Already Happened

As you see in the Poshcoder example from 2014 (which, by the way, still has a very low detection rate in the industry), fileless ransomware isn’t a brand new idea. And last year we saw UIWIX, which was essentially Wannacry adapted to run in memory, although it didn’t spread much. Perhaps as a better indicator of what’s coming, at the end of April we found a sample of SynAck, which has been around since 2015, newly adapted to run in a fileless manner using a technique called Process Doppelgänging.

History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.” 

So we are of the school that it is only a matter of time. A reasonable theory is that we haven’t seen it en masse, or at least in a significant number of smaller distributions, because other opportunities have presented themselves (like cryptomining), and what’s worked up until recently to evade detection for ransomware is still working in enough scenarios. “Fileless” is leaner and smarter, so it’s a move we should expect and for which we should be prepared.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.