Blog Layout

WastedLocker Ransomware “Most Sophisticated Attack” Outside Nation State Use

Leo Daniels • August 4, 2020

This is a subtitle for your new post

Ransomware can be better dealt with, if security teams have a better and clear view of suspect behaviour on the network.

Speaking to Infosecurity, Sophos chief product officer Dan Schiappa and principal research scientist Chester Wisniewski said a lot of issues can be dealt with if they detect how tools are being used in an unpredictable manner. Wisniewski said: “So if you see Powershell or a scanner running outside of planned maintenance, or IT needs permission to run a sniffer, those are easy to detect and if the SOC knows when maintenance is happening, they know it is bad.

“This requires discipline and while most companies don’t have SOC, and need to be investigated and look into and this is most challenging for companies.”

As Sophos publishes a multi-part research series on the realities of ransomware, Wisniewski said that the state of cybersecurity means we worry less about our parents laptop than we did ten years ago, as there is less Flash and Java use, but if you are targeted with ransomware “it is a bad day and you never find out the truth on how [the attacker] got in and hard to learn from mistakes.”

Schiappa said there is more of a nation state approach being taken by the adversary, where they are more hands on and using existing tools, doing reconnaissance and finding out which data they can ransom. He said the best detection strategy is a combination of AI used in a variety of ways, including running deep learning neural network models coupled with human intelligence.

“Look at endpoint detection and response (EDR) for example, it is learning to look for indicators of compromise and a certain chain of events that allows the analyst to scale quickly,” he said.

Among the new research by Sophos, a detailed look at new detection evasion techniques used by the WastedLocker ransomware reveals the Windows Cache Manager and memory-mapped I/O are leveraged to encrypt files. In particular, it uses memory-mapped I/O to encrypt a file, making it harder for behaviour based anti-ransomware solutions to keep track of what is going on.

Wisniewski said the likes of WastedLocker takes evasive tactics to a new level and in finding ways to bypass behavioural anti-ransomware tools. “This is the latest example of attackers getting their hands dirty, using new manoeuvres to manually disable software as a precursor to a full blown ransomware attack.

“The longer attackers are in the network, the more damage they can inflict. This is why human intelligence and response are critical security components to detect and neutralize early indicators that an attack is underway. Organizations need to know about escalating trends and harden their perimeter by disabling remote access tools like RDP whenever possible to prevent crooks from gaining access to the network, a common denominator in many ransomware attacks that Sophos analyses.”

Wisniewski called WastedLocker the most sophisticated attack he had seen outside of those used by nation states. “Not only successful as a large dollar game, but WastedLocker is investing in being as silent as possible.”

 

We’re 1-fix, we can help you secure your business

At 1-fix, we take a realistic approach to technology – ensuring our client’s systems are best protected.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration, consultation to explore how exposed your business might be and identify actions to take.

Join Our Mailing List

All sign-ups are handled inline with our privacy policy and can unsubscribe at any time.

IT Support Services
Cybersecurity Deep-Dive
IT Cloud Migration Service

Recent Blogs

Image of a keyboard with a padlock on top
By Lee Dugdale-Shutts February 10, 2025
Data loss can occur due to various reasons, including hardware failures, cyberattacks, natural disasters, and human error. To protect your business from these risks, it's crucial to implement a strong data backup and security strategy.
Photo of someone writing notes whilst putting money in a savings jar.
By Craig Atkins February 6, 2025
While technology is essential for a successful business, it can also be a significant expense. Fortunately, there are several strategies you can implement to reduce IT costs without compromising on quality or performance.
Hologram of a cloud in front of an office building
By Craig Atkins February 3, 2025
Businesses are constantly faced with decisions about how to best manage their IT infrastructure. One of the most significant choices is whether to adopt cloud services or stick with on-premises solutions. Both options have their advantages and drawbacks, and the right choice depends on your business's specific needs and goals. Let's explore the key differences between cloud services and on-premises solutions to help you make an informed decision.
Photo of building blocks saying Problem and Solution with some hands either side
By Tom Dugdale-Shutts January 29, 2025
Nowadays, businesses rely heavily on technology to operate efficiently and stay competitive. However, with the increasing dependence on IT systems, businesses also face a myriad of IT issues that can disrupt operations and impact productivity.
Photo of a computer keyboard with a written password on a post it note on top.
By Ben Somner January 27, 2025
One of the most effective tools to protect your business against cyber attacks is a password manager. But what exactly is a password manager, how does it work, and why is it essential for your business?
Photo of someone typing on a laptop with a padlock and the words 'cyber security' on the screen
By Grant Taylor-Davis January 23, 2025
One of the most effective ways to protect your organisation from cyber threats is through Security Awareness Training. But what exactly is Security Awareness Training, how does it work, and why is it essential for your business? Let's explore these questions with a focus on KnowBe4, a leading platform in this field.
Show More
Share by: