Ransomware Attacks Hitting Everywhere! (Except Banks?)

Infected billboard Thailand, Wireless Road, Bangkok #WannaCry #ransomeware

C_7BaSaUMAEDyRl.jpg


https://cdn-images-1.medium.com/max/800/1*9OBJ_pGK5ib7AImGiAW6hQ.jpeg

https://cdn-images-1.medium.com/max/800/1*e8MWOz0QgI0TcCFXyeUpBg.jpeg

https://cdn-images-1.medium.com/max/800/1*Q1Jcvd8YwjEoCumj_6ksLw.jpeg
 
Last edited:
They seem to have great customer service: http://www.reuters.com/article/us-usa-cyber-ransomware-idUSKCN0X917X

That case and others show how cyber-criminals have professionalized ransomware schemes, borrowing tactics from customer service or marketing, law enforcement officials and security firms say. Some players in the booming underworld employ graphic artists, call centers and technical support to streamline payment and data recovery, according to security firms that advise businesses on hacking threats.

“It’s a perfect business model, as long as you overlook the fact that they are doing something awful,” said James Trombly, president of Delphi Technology Solutions, a Lawrence, Massachusetts, computer services firm that helped three clients over the past year pay ransoms in bitcoin, the virtual currency. He declined to identify the clients.

Some operations hire underground call centers or email-response groups to walk victims through paying and restoring their data, said Lance James, chief scientist with the cyber-intelligence firm Flashpoint.

Graphic artists and translators craft clear ransom demands and instructions in multiple languages. They use geolocation to make sure that victims in Italy get the Italian version, said Alex Holden, chief information security officer with Hold Security.

If your computer is locked up, how do you make a bitcoin payment online to them?

https://www.bloomberg.com/news/arti...ing-the-hackers-because-using-bitcoin-is-hard

Hardly Anyone Paying the Hackers? Because Using Bitcoin Is Hard

Deadlines for paying the ransom are beginning to pass

Only an estimated $50,000 had been paid as of early Monday


An unprecedented cyberattack swept across the globe over the weekend, but so far the majority of victims haven’t paid hackers a ransom.

After the ransomware began infecting users on Friday, they were given 72 hours to pay $300 in bitcoin -- chosen by the hackers because the crypto currency is harder to track than conventional payments -- or pay twice as much. If they refused to pay after seven days, their computer would be permanently locked -- a serious problem for those who haven’t backed up their data.

As of early Monday, only about $50,000 had been paid in ransoms, according to Elliptic Enterprises Ltd., a London-based company that tracks illicit use of bitcoin. The company calculated the total based on payments tracked to bitcoin addresses specified in the ransom demands, adding that it expects the total to rise.

"The amount is indeed low," said Michela Menting, digital security research director at ABI Research. "This is likely due to the fact that organizations have initiated their backup and recovery procedures."

Moreover, for those who didn’t save their data on a separate system, paying a ransom isn’t like buying something from Amazon by entering their credit or debit card information. Even though the hackers provided a helpful link for those new to paying in bitcoin, the crypto currency is a black box for most people.

"If you’re presented with something that says pay this amount in bitcoin, most people don’t know where to start with that," said James Smith, the CEO and co-founder of Elliptic.

There are several steps. First, a person or business has to obtain the bitcoins by registering with one of the various online exchanges and going through its verification process. After that, money can be deposited into the exchange. For those living in countries that don’t have an exchange, including the U.K., money must be converted into another currency.

Once the money is deposited on the exchange, the bitcoins can be sent to the address provided by the extortionist. "It looks like a long garbled string of text," Smith said. After the fee is paid, the hackers supposedly free the affected computer.

"A large amount of bitcoin is actually somewhat difficult to source quickly," said Alex Sunnarborg, an analyst at bitcoin research company CoinDesk, adding it might take a few days to create an account at a bitcoin brokerage or exchange, connect a bank account, and then receive the bitcoin.
 
Last edited:
http://www.telegraph.co.uk/technolo...obal-cyber-attack-experts-examine-ransomware/

Cyber attacks linked to North Korea, security experts claim

Cyber security researchers have found technical clues they said could link North Korea with the global WannaCry "ransomware" cyber attack that has infected more than 300,000 machines in 150 countries since Friday.

Symantec and Kaspersky Lab said on Monday some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a North Korea-run hacking operation.

"This is the best clue we have seen to date as to the origins of WannaCry," Kaspersky Lab researcher Kurt Baumgartner told Reuters.

“At this time, all we have is a temporal link,” Eric Chien, an investigator at Symantec, told the New York Times. “We want to see more coding similarities to give us more confidence.’’

American officials said Monday that they had also seen the same similarities, the newspaper reported.

Both firms said it was too early to tell whether North Korea was involved in the attacks, which crippled the NHS on Friday and became one of the fastest-spreading extortion campaigns on record.

The cyber companies' research will be closely followed by law enforcement agencies around the world, including Washington, where US President Donald Trump's homeland security adviser said on Monday that both foreign nations and cyber criminals were possible culprits.
 
Back
Top