copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

Ransomware lands on Australian shores

Date: 26 September 2012

Click here for printable version

Yesterday AusCERT was notified of a server being held hostage by ransomware. All data and backup storage attached to the server had been encrypted, accompanied by a message titled "Anti-Child Porn Spam Protection". The message advised that illegal sites had been accessed and in order to retrieve the data the victim had to pay $3,000. Non-compliance would result in a report being sent to law enforcement with a sample of images allegedly from the illegal site. While similar malware has been circulating overseas, it is only recently that Australian organisations have been targetted.

An excellent explanation of the malware is available on the Emsisoft website, an Austrian anti-malware vendor, including some possible ways to recover the data. However the ransomware currently circulating in Australia may be a new variant. For those wanting to try the suggestions in the article, make sure this is only attempted on a copy of the data as it is not known what an incorrect code will do.

The previously mentioned organisation wanted to know how they could get their data back. However without recent backups, and relatively little known about this specific variant, the unfortunate reality is that the data is not recoverable. Some may be tempted to pay the ransom, however be warned that there are no guarantees the data will be returned and it is highly likely that your organisation will be targeted again. Next time, it might not be as easy as restoring a server or paying a ransom.

In order to protect against such attacks, the following best practices are worth repeating:

  • Patch all applications and operating systems
  • Run, and test, regular daily backups and either store a copy of recent backups off site or ensure that backup data is not directly accessible e.g. via a network share or a directly accessible external hard disk
  • Disable unnecessary services e.g. leave RDP disabled if it is not needed
  • Enforce complex password policies and account lockout policies to defend against brute force attacks
  • Only allow secure remote connections (e.g. VPN or SSH tunnelling) from known individuals and services
  • Review the DSD Top 4 for Windows Environments

    Till next time,
    Olivia