An ransomware named SamSam is different from familiar forms of ransomware. While other versions are emailed to potential victims, SamSam attacks take advantage of RDP access exposures – whether by BRUTE FORCE attacks, or CREDENTIALS purchased on DARK WEB.
After hacking into a non-rugged machine, attackers look for vulnerabilities that they exploit to distribute the code on the organization’s internal network before encrypting files.
Once the attackers have a grip on the network they perform the encryption of a significant number of machines and demand a ransom payment in bitcoin in exchange for decryption keys. Payments can reach over $50,000.
SamSam requires higher capabilities from attackers compared to other forms of ransomware, but time and effort pay off for crooks – Sophos researchers analyzed payments made into attackers’ bitcoin wallets and found they had already received about $5.9 million.
The immediate conclusion is to reduce the use of RDP and in cases where it is required to perform hardening such as:
- Allow access only from specific addresses
- Assign MFA in identification
- Harden the machine at the operating system level