throbber
Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 1 of 14
`

`

`

`

`

`

`
`Exhibit 31
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 2 of 14
`
`W H I T E PA P E R
`
`Ransomware Tactics &
`Detection Techniques
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 3 of 14
`
`Contents
`
`Ransomware Evolution ........................................................................................................... 3
`
`Infection Vectors ....................................................................................................................... 4
`
`Email ...............................................................................................................................................4
`
`Email Attachment ........................................................................................................................4
`
`Email Links ....................................................................................................................................5
`
`Drive-by Infections Using Exploit Kits ..................................................................................5
`
`Direct Web Downloads .............................................................................................................5
`
`Wormable Exploits......................................................................................................................5
`
`Trojan Downloaders...................................................................................................................5
`
`Ransomware Encryption Process ......................................................................................... 5
`
`Encryption .....................................................................................................................................5
`
`Decryption ....................................................................................................................................6
`
`Cyphort’s Ability to Detect Ransomware ............................................................................ 6
`
`Object Analysis Pipeline ..........................................................................................................6
`
`Network Analysis Pipeline .......................................................................................................7
`
`Use Cases ...................................................................................................................................7
`
`Email Attachments ......................................................................................................................7
`
`Example ..................................................................................................................................8
`
`Exploit Kits .....................................................................................................................................9
`
`Example ..................................................................................................................................9
`
`Direct Web Downloads ........................................................................................................... 10
`
`Wormable exploits ................................................................................................................... 10
`
`About Cyphort ..........................................................................................................................12
`
`2
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 4 of 14
`
`Although
`ransomware is not
`new, it has grown
`exponentially in
`the past few years
`given the success
`some of the
`campaigns have
`enjoyed. The table
`below shows that
`we have gone from
`almost nothing in
`2012 to a plethora
`of ransomware
`in 2017.
`
`Ransomware Evolution
`
`Ransomware is one of the most pervasive and destructive threats that organizations and
`
`individuals face today. It is malware that takes your computer or its data hostage and demands
`
`the payment of a ransom to return control of the computer or restore the data.
`
`Over the years, ransomware evolved to take many forms, the goal being the same: extort a
`
`ransom from the victims.
`
` ⊲ Application-level Lockers: Some ransomware prevents victims from using their computer.
`
`Reveton, for instance, prevents users from logging in and displays a note purporting to be from
`
`a law enforcement agency and demands payment of a “fine” to unlock the computer. Others,
`
`such as the Manifesto or Ransom Locker, display a ransom note and prevent the user from
`
`doing anything else on their computer. Other ransomware can hijack the browser and make it
`
`look like you cannot browse to any other site until the ransom is paid.
`
` ⊲ System-level lockers: Some ransomware like Petya or PetrWrap will overwrite the Master Boot
`
`Record with its own mini kernel and render the computer useless except for dealing with the
`
`ransom. Other ransomware in this category include HDDCryptor, GoldenEye and Satana.
`
` ⊲ File encryptors: This category has become the most widespread of all ransomware and
`
`is today the method of choice for cyber criminals. It consists of encrypting user files and
`
`demanding a ransom for the encryption key. There are many notable examples in this category,
`
`like Cryptowall, TeslaCrypt, Cerber, TeslaCrypt, Radamant, KeRanger and WannaCrypt0r.
`
` ⊲ Fake ransomware: This type doesn’t actually encrypt data or hold any resource captive while
`
`asking for a ransom. Instead, it rides on the popularity of other ransomware and uses scare
`
`tactics to trick its victims into paying.
`
`Although ransomware is not new, it has grown exponentially in the past few years given the
`
`success some of the campaigns have enjoyed. The table below shows that we have gone from
`
`almost nothing in 2012 to a plethora of ransomware in 2017.
`
`Year
`
`Count of ransomware
`families
`
`2012
`
`2
`
`2013
`
`8
`
`2014
`
`15
`
`2015
`
`35
`
`2016
`
`174
`
`Most prominent
`ransomware
`
`Rannoh,
`Reveton
`
`CryptoLocker,
`Kovter,
`Urausy
`
`CryptoWall,
`CryptoLocker,
`CBT-Locker
`
`TeslaCrypt,
`DMA-Locker,
`Cryptonite
`
`Cerber, Locky,
`CryptXXX
`
`The continued growth of ransomware is driven by several key factors:
`
` ⊲ Efficacy of the threat. Many victims depend on the data that’s taken hostage to run the day
`
`to day operations of their business. If the victim has no backup, their only remedy is to pay the
`
`ransom and hope they can recover the data.
`
` ⊲ Time pressure. In most cases, time is on the side of the attacker. A hospital or airline, for
`
`example, may not be able to sustain a non-functional IT infrastructure for too long. To make
`
`matters worse, many ransomware attacks rely on clever tactics to push victims to pay quickly:
`
`ransom amounts may double after some time, files may start getting deleted every hour, all files
`
`deleted after a certain deadline.
`
`3
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 5 of 14
`
` ⊲ Success rate of previous campaigns. According
`
`to many sources, the ransomware economy has
`
`reached $1B in 2016. CryptoLocker alone has
`
`raked more than $390M in 2016 by infecting an
`
`average of 90,000 victims a day.
`
` ⊲ Availability of CryptoCurrency. It is important
`
`for cyber criminals to launder their proceeds
`
`from the ransoms and crypto currency makes
`
`it somewhat easier. Bitcoin is the currency of
`
`choice and even though transactions on Bitcoin
`
`wallets are public, it’s almost impossible to track
`
`the parties to a transaction.
`
` ⊲ Exploit Kits. The availability of very successful exploit kits, mainly Angler, Nuclear, Neutrino and
`
`RIG made it relatively painless for ransomware actors to deliver their payloads over proven
`
`infection methods.
`
`Infection Vectors
`
`Email
`
`Email remains the number 1 method of delivery of ransomware. Using a very convincing message,
`
`cyber criminals may get a victim to open an email attachment or click on a link that ultimately
`
`leads to the infection.
`
`Email Attachment
`
`Usually these attachments take the form of a Word document purporting to be a shipment
`
`notification, which in fact contains malicious obfuscated Visual Basic script. The VB script will
`
`either embed the ransomware binary in its own data and proceed to decrypt it and write it to
`
`disk then launch it, or it will reach out to a web site to download the ransomware binary then
`
`execute it.
`
`The Locky campaign was particularly successful at attaching a malicious JavaScript code inside
`
`a zip file to emails. The script files will have file extensions that seem to be documents to entice
`
`the victim to open them. The script would then download the ransomware from the internet and
`
`launch it.
`
`Sometimes, the attachments will attempt to take advantage of a vulnerability in the handler
`
`application. For example, a malicious PDF could attempt to exploit an unpatched or zero-day
`
`vulnerability in Adobe Acrobat Reader, drop the ransomware binary, then execute it. The same
`
`goes for Microsoft Office documents. This approach has nonetheless diminished lately due to the
`
`low number of known vulnerabilities that are unpatched.
`
`Sometimes the Office or PDF attachments contain nothing but links to a website which hosts
`
`the ransomware. This method is rarely used because it requires the user to interact with the
`
`downloaded file and agree to execute it, which raises suspicion of the victim.
`
`4
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 6 of 14
`
`A user who
`visits a website
`can fall victim
`to ransomware
`without any
`interaction
`required.
`
`Email Links
`
`Although mostly used for phishing attacks, links have also been used to download ransomware
`
`with limited success.
`
`Drive-by Infections Using Exploit Kits
`
`In this method of infection, a user who visits a website can fall victim to ransomware without any
`
`interaction required. The threat actors will either compromise a web site and inject code to redirect
`
`the user to the exploit kit, or resort to malvertising. In both cases, the user’s browser is redirected
`
`towards an intermediate site that contains javascript that will identify vulnerabilities either in the
`
`browser or its plugins and deliver a payload that will trigger the exploitation. The exploit is either in
`
`Javascript, flash or silverlight depending on the versions installed in the browser. Once an exploit is
`
`successful, the exploit kit downloads a ransomware binary and executes it.
`
`Direct Web Downloads
`
`Ransomware can also be downloaded directly from the web when the user falls victim to a social
`
`engineering tactic. When the user thinks they are downloading a nifty new text editor or a PC
`
`cleaner, it might actually be ransomware in disguise.
`
`Wormable Exploits
`
`The WannaCry mass infection of May 2017 put the spotlight another method of infection, namely
`
`exposed vulnerabilities on the web. It gave birth to Ransomworms which can attack computers
`
`directly from the Internet using a vulnerability in the SMB file-sharing protocol and dropping
`
`ransomware in the form of an encrypted DLL.
`
`Trojan Downloaders
`
`Ransomware can also be downloaded by other malicious Trojans like Upatre, Bedep and
`
`Nemucod. Upatre and Nemucod are usually spread through email attachments and it is critical
`
`they be detected so the infection can be stopped at the earliest kill chain phase possible.
`
`Ransomware Encryption Process
`
`A typical ransomware encryption process will use a combination of public key algorithms and
`
`private key algorithms. The private key algorithm is used to encrypt the files themselves while the
`
`public key algorithm is used to encrypt the file encryption keys.
`
`The operation proceeds as follows:
`
`Encryption
`
`1. When the ransomware is run, it reaches out to its C&C server with some identification of the
`
`victim’s computer.
`
`2. The C&C server generates a pair of public and private keys specific to the victim’s computer
`
`and responds with the public key. The corresponding private key is safely stored on the
`
`C&C server. It is worth noting here that some ransomware bypasses these first two steps by
`
`including the public key in the ransomware binary itself, which is custom-built on the fly for
`
`the intended victim.
`
`5
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 7 of 14
`
`3. The ransomware enumerates all the files it needs to encrypt using a hardcoded list of data
`
`file extensions.
`
`4. It then generates locally a set of private symmetric keys to be used for encrypting the files.
`
`Symmetric keys are used for both encryption and decryption. In some cases one key per
`
`file is generated, in other cases it could be one key per file extension or just one key for the
`
`entire set. It all depends on how paranoid the malware author is.
`
`5. The ransomware uses the private key algorithm and the symmetric private keys generated
`
`in the previous step to encrypt the files.
`
`6. Then the private encryption keys themselves are encrypted using the public key from step
`
`two. The result is stored in the victim’s computer’s key store.
`
`7. The ransom note is displayed, sometimes with an incentive to pay quickly.
`
`Decryption
`
`1. Once the malware operator receives payment, the private key from the C&C server is sent
`
`to the ransomware decryptor code.
`
`2. This private key is then used to decrypt the symmetric private keys used earlier to encrypt
`
`the files and which were stored in the local key store.
`
`3. The symmetric private keys obtained are used to decrypt and recover the original data files.
`
`Earlier versions of ransomware like CryptoWall 2.0 were not as sophisticated and used the
`
`public key directly to encrypt data files. Cryptowall 3.0 evolved to the process above combining
`
`public/private keys and symmetric keys. Cerber uses a combination of RSA public/private keys
`
`and RC4 keys. Typically, a combination of AES and RC4 encryption algorithms are used with
`
`varying ciphers.
`
`Cyphort’s Ability to Detect Ransomware
`
`Detecting ransomware can be doe using network-based detection or endpoint-based detection.
`
`We will focus on network-based detection and more specifically how Cyphort detects these
`
`advanced threats.
`
`Cyphort’s advanced detection fabric includes multiple detection and analytics capabilities, which
`
`work together to quickly identify advanced targeted attacks like ransomware. These capabilities
`
`are summarized below.
`
`Object Analysis Pipeline
`
`All files analyzed by Cyphort go through a multi-stage detection pipeline within the SmartCore
`
`analytics angine, which is comprised of the following components:
`
` ⊲ Static AV Engine - leverages top-tier Anti-Virus technology with very frequent signature
`
`updates to detect known viruses.
`
` ⊲ Reputation Engine - provides reputation-based detection, where file hashes, signers and
`
`other meta-data about the file and the context around its source are compared to our threat
`
`intelligence knowledge base.
`
`6
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 8 of 14
`
` ⊲ Behavioral Engine - performs dynamic analysis of the object’s behavior in a sandbox
`
`environment and applies machine learning models to the observed behavior.
`
` ⊲ Emulation Engine - emulates files containing scripts as an alternative to full behavioral analysis.
`
` ⊲ Yara Engine - allows application of Yara rules to files as well as memory dumps obtained during
`
`behavioral analysis.
`
`Network Analysis Pipeline
`
`Traffic visible to Cyphort also goes through a couple of steps before files are extracted
`
`for analysis:
`
` ⊲ Snort rules - all traffic is subjected to snort rules from Cyphort Labs as well as third
`
`party sources.
`
` ⊲ Chain Heuristics - flags suspicious traffic and submits it to a browserp-based dynamic
`
`analysis environment where heuristics rules are applied to identify malicious traffic like
`
`exploit kits redirects.
`
`Use Cases
`
`The detection methods for ransomware are usually tailored to the delivery mechanism. Let’s
`
`review each delivery mechanism above and discuss what methods of detection Cyphort uses in
`
`each case.
`
`Email Attachments
`
`Cyphort can monitor email traffic using either a journaled account or Bcc mailbox. In both cases,
`
`Cyphort extracts all email attachments and submits them to SmartCore’s Object Analysis Pipeline,
`
`where it extracts all links (including links inside attachments) and submits them to SmartCore’s
`
`reputation engine. Cyphort integrates with Office365 and Gmail to provide seamless remediation
`
`capability by blocking or quarantining malicious emails.
`
`If ransomware is being delivered via a PDF, Office document, malicious Javascript or
`
`executable file attached to an email, Cyphort uses all elements of the Object Analysis Pipeline
`
`to identify the threat.
`
`Locky was a prominent example of ransomware downloaded by an email attachment. The
`
`attachment itself is either a Javascript file inside a zip file or a Word document with a VBA macro
`
`claiming to be an invoice or a shipment notification.
`
`Cyphort detects the Javscript zipped attachments as Exploit.Script.
`
`7
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 9 of 14
`
`Cyphort detects the Word documents as TROJAN_NEMUCOD.DC or TROJAN_DONOFF.DC.
`
`If the email contains a link to the ransomware, Cyphort submits the link to SmartCore’s reputation
`
`engine which has the capability to:
`
` ⊲ Perform a reputation lookup of the URL or domain and assess the risk.
`
` ⊲ Perform a crawl of the URL and assess the risk based on the content returned.
`
` ⊲ Perform predictive analysis based on past history of the site or URL to estimate how likely is
`
`the site going to be malicious in the future.
`
`Example
`
`Phishing email purporting to be from Microsoft alerting the recipient on a suspicious activity and
`
`enticing them to visit their recent activity page.
`
`Email SHA256: 5b18f7f958a39cc37b36f9766bfe2c12d5d28854695ba8c14f598f1070ad9cf6
`
`This phishing email has a link to “http://voperforseanx[.]top/site/
`
`chrome_update.html” which leads to downloading a Cerber Ransomware
`
`(5855d6b239620e53c8c60acee3d0960b84fbb75f2f9b20b2ccf721a8fc5a88a2)
`
`8
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 10 of 14
`
`Cyphort detects this threat and classifies it as a Phishing incident.
`
`Exploit Kits
`
`Usually, exploit kits redirect users through a series of web pages designed to assess which
`
`component of the browser is vulnerable and deliver the appropriate exploit. The final payload
`
`may be totally encrypted.
`
`Example
`
`Source: http://www.malware-traffic-analysis.net/2017/03/20/index2.html
`
`A user visits simply-vegan.org, a site which has been compromised with an iframe injection by the
`
`pseudo darkleech campaign.
`
`The iframe redirects the user to mobilalibey.com which hosts the RIG landing page. The landing
`
`page JavaScript assess the user’s environment and detects a vulnerable version of Adobe Flash
`
`player. The browser is instructed to download the proper Flash exploit, which in turn downloads
`
`the final payload which is Cerber ransomware.
`
`9
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 11 of 14
`
`In this case, Cyphort detects and correlates between two components of the attack: the
`
`redirection to the RIG exploit kit is detected as an IN event and the download of the Flash exploit
`
`is detected as a DL event. Both are combined in a single incident as EXPLOIT_RIGV.CY.
`
`Figure: Detection of RIG exploit kit delivering ransomware.
`
`Direct Web Downloads
`
`Source: http://www.malware-traffic-analysis.net/2017/05/17/index.html
`
`In this example of direct download, the threat actors use some social engineering tactics to make
`
`the user of Google Chrome believe the web site they are visiting requires a new font that the
`
`browser does not have. They prompt the user to download the font in the form of an executable
`
`font installer for Chrome. Once downloaded and launched, the ransomware springs into action.
`
`In this case, several elements of the Object Analysis pipeline are able to detect this threat as
`
`RANSOM_GENASOM.DC as seen below.
`
`Wormable exploits
`
`The WannaCry pandemic brought to the general public’s attention the devastating effects of a
`
`worm that leverages a vulnerability to spread like wildfire and deploy advanced ransomware. In
`
`this case, the vulnerability in the Windows File sharing protocol SMBv1 was exploited via what is
`
`known as the EternalBlue exploit. This exploit was allegedly developed by the NSA as a cyber
`
`weapon and stolen by the Shadow Brokers group, then disclosed to the public. Even though a
`
`patch was already available before the vulnerability and exploit were made public, many systems
`
`remained unpatched and therefore fell victims to the WannaCry attack.
`
`10
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 12 of 14
`
`Over the network, the ransomware WannaCrypt0r was transferred as an encrypted DLL.
`
`Cyphort detects this attack in the Network Analysis pipeline as EXPLOIT_ETERNALBLUE.CY.
`
`Detection of EXPLOIT_ETERNALBLUE.CY
`
`As ransomware attacks continue to evolve, their specific strategies, tactics, and technology
`
`components will evolve as well. Cyphort Labs will continue to monitor and analyze these
`
`developments to ensure that Cyphort detection technologies are continually enhanced and
`
`optimized to help protect customers against these attacks in the future.
`
`In order to protect against the threat of ransomware, we recommend you take the
`
`following measures:
`
` ⊲ Patch your systems early. Threat actors prey on the window of opportunity between the time
`
`a vendor discloses fixes for a particular vulnerability and the time computers are patched.
`
`With automation, some cyber criminal groups have become very quick at integrating new
`
`capabilities into their exploit kits.
`
` ⊲ Back up your data frequently and test the backup periodically to avoid unpleasant surprises
`
`the day you need to restore.
`
` ⊲ Invest in staff training on social engineering tactics used by cyber criminals to avoid opening
`
`the wrong attachments or clicking on a bad link.
`
` ⊲ Do not rely exclusively on prevention methods which tend to lag behind new threats given
`
`the speed at which they need to make an assessment. Make sure you deploy detection
`
`methods to root out any advanced threat already in your network which could be “hired” to
`
`install ransomware.
`
` ⊲ Provide your SOC team with a platform that allows correlation of incidents across multiple
`
`security devices. Alert fatigue is a major reason why a backdoors remain undetected for a
`
`long time.
`
`11
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 13 of 14
`
`About Cyphort
`
`Cyphort, Inc. is a security software company providing mid- and large-size enterprise customers
`
`with innovative security analytics for advanced threat defense. The solution is built with an open
`
`architecture that integrates with existing security tools to discover and contain the advanced
`
`threats that bypass the first line of security defense in an organization. Based in Santa Clara,
`
`California, the company was founded in 2011, is privately-held, and distributes its software through
`
`direct sales and channel partners across North America and international markets. Learn more at
`
`www.cyphort.com.
`
`12
`
`White Paper: Ransomware
`
`

`

`Case 3:17-cv-05659-WHA Document 171-26 Filed 07/27/18 Page 14 of 14
`
`5451 Great America Pkwy, Suite 225, Santa Clara, CA 95054
`
`P 1.408.841.4665 | F 1.408.540.1299 | info@cyphort.com
`
`Cyphort, Inc. is a network security company providing mid- and large-size enterprise customers with the innovative Adaptive Detection Fabric, a scalable software
`solution designed to integrate with existing security tools to discover and contain the advanced threats that bypass the first line of security defense in an organization.
`Based in Santa Clara, California, the company was founded in 2011 and distributes its software through direct sales and channel partners across North America and
`international markets. Learn more at www.cyphort.com. Copyright 2017 Cyphort, Inc. All rights reserved. Part#M1024-001US
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket