1 of 17

Ransomware Defense for Small Businesses

Tao Zimmerman, Colton Hulce, Louis Najdek, William Atwood

2 of 17

Information Disclaimer

The testing performed was done in a safe environment, with no connection to any network. We are not responsible for any damages caused by attempting the content depicted in this presentation.

3 of 17

Project Objectives

  • Create a training beneficial for all members of an organization to learn about ransomware
  • Create additional videos and written documentation that clients will also have access to
  • Demonstrate a real ransomware attack to show how it may look

4 of 17

End-User Guide - Sections

  • Attack Vectors
    • Identifying phishing emails
    • Suspicious downloads
    • Internal Attacks
  • Indicators of Compromise
  • Response to a Ransomware attack

5 of 17

End-User Guide - Learning Materials

6 of 17

End-User Guide - Learning Goals

  • Ensure the organization’s non IT staff is informed on the best practices for avoiding ransomware
  • Understanding their responsibility to their organization to remain vigilant for attacks
  • Be prepared to swiftly identify and respond to a Ransomware attack

7 of 17

System Administration Guide - Sections

  • Backups
  • End-User Training & Awareness
  • Maintaining Services & Utilizing Anti-Virus
  • Segmentation & Least Privilege
  • Penetration Testing
  • Response Plan

8 of 17

System Administrator Guide - Learning Goals

  • Understanding the importance of each section of the guide
  • Offer a clear explanation of the information to better benefit the client
  • Demonstrate how ransomware will impact a system

9 of 17

Ransomware Demonstration

10 of 17

Individual Research: Wannacry

  • Was used for the demonstration
  • Utilized Windows SMBv1 Vulnerability
  • Operated like a Worm, spreading over the local network, open ports, the internet, etc
  • Demanded $300 of Bitcoin within 3 Days, Upped to $600 of Bitcoin for 4 days before deleting files

11 of 17

Individual Research: BlackMatter

  • Utilizes PRE-COMPROMISED credentials.
  • Shuts down security programs and controls and changes their registry keys to stop them from starting on login.
  • Demands $5.9 million and after a week, demands $11.8 million.
  • Does an overall sweep of the device to find network shares via SMB to move laterally.

12 of 17

Individual Research: Cryptolocker

  • Targeted windows devices
  • Distributed through Spam emails targeting businesses, enticing them to open a file by describing a balance dispute
  • Additionally distributed through the Gameover Zeus Botnet
  • Creates a copy of itself in %AppData% and an autorun registry entry, then deletes the original file. Contacts the C2 server and begins encryption utilizing Microsoft’s CryptoAPI and an RSA keypair

13 of 17

Individual Research: Babuk

  • Nwgen Ransomware
  • AES-256-CRT cryptographic algorithm
  • ChaCha8 Cipher
  • $150,000 - Monero
  • Infiltrate and steal large amounts of data
  • Exfiltrate data, threaten to do more
  • .nwgen

14 of 17

Project Outcomes

  • Created video guides for End-Users and Sys Admins
  • Created written documentation to go along with the videos
  • Created a training PowerPoint

15 of 17

Challenges

  • Determining what is and isn’t important to keep it time-conscious
  • Time Management
  • Organizing the project with a large group
  • Communication with client

16 of 17

The future of the project

  • Will be used for internal and client training at the Leahy Center
  • Hopefully future students will be able to keep the guide up to date for continued usage
  • Could continue to grow if another student were to pick it up

17 of 17

Questions?