Kitchener-Waterloo

Self-spreading ransomware next computer threat, Cisco Systems says

An unusual strain of virus-like hacker software that exploits computer server vulnerabilities – without requiring human interaction – is a leading example of a new generation of "ransomware," according to a new report by Cisco Systems Inc.

Samsam or Samas strain encrypts large databases and locks out authorized users until ransom paid

Security experts warn about "ransomware," where computers or mobile phones are locked down by cyber thieves and money is demanded online. (Ryan Remiorz/Canadian Press)

An unusual strain of virus-like hacker software that exploits computer server vulnerabilities – without requiring human interaction – is a leading example of a new generation of "ransomware," according to a new report by Cisco Systems Inc.

Hackers use such software to target large-scale networks and hold data hostage in exchange for bigger payments. Such a strain, known as Samas or samsam, hit the MedStar Health Inc. hospital chain last month.

In such attacks, hackers target backup files and records, encrypting them to make them an unreadable gobbledygook of characters. To regain access, users without additional safe backups who don't want to lose critical files often pay the ransom, typically $10,000 to $15,000 for an entire network or hundreds to a thousand or so dollars for a single computer.

The ability to demand payment in bitcoin, a difficult-to-trace virtual currency not controlled by any country, was "basically the birth of ransomware" and has helped drive its success since the currency's introduction in 2009, said Craig Williams, a senior technical leader at Cisco's Talos security research group.

How Samas works

Samas exploits vulnerabilities giving hackers a way into JBoss application servers that are frequently used by some of the largest corporations. Once inside, the hackers sometimes implant a tool that steals credentials, allowing it to spread through the system, and encrypt scores of digital files along the way.

Ransomware has become a new targeted attack, with thousands of variants emerging over the last six months, said Dmitri Alperovitch, co-founder and chief technology officer of Crowdstrike Inc.

Most ransomware still requires a human to click a link or open an infected email attachment, but Cisco's report warned that "the age of self-propagating ransomware, or cryptoworms, is right around the corner." Worms are generally virus-like infections that are programmed to spread automatically, without human interaction. 

The semi-autonomous nature of this ransomware means that defences, such as maintaining updated and patched systems and safe backups, are more predictable than teaching users to safely use the Internet.

Recent growth

Ransomware has become an increasing threat over the last six months, with reported cases on pace to beat last year's numbers.

Last year's 2,453 reports of ransomware hackings to the FBI totalled a reported loss of $24.1 million, making up nearly
one-third of the complaints over the past decade. They also represented 41 per cent of the $57.6 million in reported losses since 2005. Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates.