CryptoWall 4.0 is a pimped up version of its earlier forms. The cybercriminals have reacted as expected and upped their game - the cyber war arms race escalates. The 4th version of the extortion malware is even more evil. Here are some of the new and “improved” features of this nasty piece of malware:
All of the above are designed to make CryptoWall 4.0 even more successful than its predecessors.
The CryptoWall malware is still usually sent as an attachment in an email. Often disguised as a curriculum vitae, when opened it runs a set of JavaScript files, which download the ransomware and execute it on your system.
There have also been some changes to the way the cybercriminals behind CryptoWall are presenting themselves. For example, in the screen presented to the victim of the encrypted data, the perpetrators describe themselves as if they are a helpful computer security researcher, the victim being now part of a ‘CryptoWall community’ and that they are doing this in the interests of ‘security research’. They even state that CryptoWall “…is not intended to harm a person and his/her information data.” They also offer online support and one free decryption; they are turning ransomware into a well-oiled machine and a lucrative one at that. This is all a bit rich coming from a group that then go on to tell you if you don’t pay hundreds of dollars within x number of days that you won’t get your data back. It seems the cybercriminal network behind CryptoWall has become extremely confident, even arrogant.
The problem that we have as business owners is that the people behind CryptoWall have turned their beady eyes on the small - medium organization. SMBs were targeted more than any other sized organization or individual in 2015. In June-July this year, for example, 67.23% of CryptoWall related emails were found in the SMB sector.
The best way to avoid the devastation of a CryptoWall infection is to simply not get infected. If you do, it’s a case of hoping you have a backup that wasn’t affected by the malware (some backup systems are) or pay the ransom – which, of course, is no guarantee that you will actually get your files back again, we are dealing with criminals after all.
Prevention, in the case of CryptoWall, is better than cure. Firstly, you need to make sure you educate your users about the type of emails that may contain the malware. Secondly, make sure you have security software in place that can handle such stealthy threats. This entails using threat monitoring like the Carbon Black security intelligence system, which can spot a ransomware threat and send out an alert before it reaches your network.
Stay safe and stay ransomware free.