Skip to content
  • Home
  • RESOURCES
  • LEARN
  • About MSoS

Making Sense of Security

Securing your Digital World.

  • LATEST
  • RESOURCES
  • COURSES
  • ABOUT MSOS
Making Sense of Security

SNAKE Ransomware Targeting Entire Corporate Networks

Security researchers have observed samples of the new SNAKE ransomware family targeting organizations’ entire corporate networks.

Discovered by MalwareHunterTeam and analyzed by Vitali Kremez, SNAKE is written in Golang and contains a high level of obfuscation.

Upon successful infection, the ransomware deletes the machine’s Shadow Volume Copies before terminating various processes associated with SCADA systems, network management solutions, virtual machines and other tools. It then proceeds to encrypt the machine’s files while skipping over important Windows folders and system files. As part of this process, it appends “EKANS” as a file marker along with a five-character string to the file extension of each file it encrypts.

The threat wraps up its encryption routine by dropping a ransom note entitled “Fix-Your-Files.txt” in the C:\Users\Public\Desktop folder. This ransom note instructs victims to contact “bapcocrypt@ctemplar.com” in order to purchase a decryption tool.

The ransom note of SNAKE ransomware (Source: Bleeping Computer)

That’s not all the ransom note says. Bleeping Computer points this out in a blog post on SNAKE:

As you can see from the language in the ransom note, this ransomware specifically targets the entire network rather than individual workstations. They further indicate that any decryptor that is purchased will be for the network and not individual machines, but it is too soon to tell if they would make an exception.

SNAKE isn’t the first ransomware that’s directed its focus to entire corporate networks. Back in March 2019, for instance, researchers discovered a new variant of the CryptoMix Clop ransomware family that claimed to target entire networks instead of individual users’ machines. A few months later, the security community learned of a new crypto-ransomware threat called “TFlower” targeting corporate environments via exposed Remote Desktop Services (RDS).

The emergence of SNAKE ransomware highlights the need for organizations to defend themselves against a ransomware infection. They can use these recommendations to prevent a ransomware infection in the first place. They should also consider investing in a solution like Tripwire File Analyzer for the purpose of detecting suspicious files and behavior on the network.

View Original Source Article HERE

Security

Post navigation

Malware in the Cloud: Protecting Yourself Based on Your Cloud Environment
FTC to Hold Workshop Tomorrow Regarding Non-Compete Agreements in the Workplace

Securing Your WordPress Site Course

Bullguard

Making Sense of Security Some rights reserved.

Privacy Policy | Terms and Conditions | EULA

 

WordPress Di Blog Theme

en English
af Afrikaanssq Albanianar Arabicbs Bosnianbg Bulgarianzh-CN Chinese (Simplified)zh-TW Chinese (Traditional)hr Croatiancs Czechda Danishnl Dutchen Englishet Estoniantl Filipinofi Finnishfr Frenchgl Galicianka Georgiande Germanel Greekht Haitian Creolehaw Hawaiianiw Hebrewhi Hindihu Hungarianis Icelandicid Indonesianga Irishit Italianja Japanesejw Javaneseko Koreanku Kurdish (Kurmanji)lo Laola Latinlv Latvianlt Lithuanianlb Luxembourgishms Malayml Malayalammt Maltesemn Mongolianne Nepalino Norwegianfa Persianpl Polishpt Portuguesero Romanianru Russiansm Samoangd Scottish Gaelicsr Serbiansk Slovaksl Slovenianes Spanishsv Swedishth Thaitr Turkishvi Vietnamesecy Welshyi Yiddish