Ransomware 2.0: Spora now steals your credentials and logs what you type

sporaenglishnote.png

English language Spora ransom note.

Image: Malwarebytes

A vicious strain of ransomware has been upgraded to steal browsing information and record keystrokes from infected PCs.

Spora ransomware - one of the most common families of the file-locking malware - appears to be following in the footsteps of Cerber, which recently gained the ability to steal passwords and currency from Bitcoin wallets.

By stealing credentials from victims, criminals are ensuring a double payday, because not only can they make money from extorting ransoms, they can also potentially sell stolen information to other criminals on underground forums.

All of this is achieved with the aid of a complex encryption process, which Spora has become known for, combining an AES key and an RSA public key to lock files on the victim's computer.

In addition, the ransomware also uses Windows Crypto API to encrypt temporary data and Windows Management Instrumentation to delete backup copies of all encrypted files.

Essentially, Spora was already a powerful form of ransomware before gaining the ability to steal data, with this new variant spotted by cyber security researchers at Deep Instinct.

This version of Spora -- distributed during a 48-hour campaign that began on August 20 -- is spread by a phishing campaign that sends targets a Word document claiming to be an invoice.

In order to see the contents of the file, the user is asked to enable a Windows Script File, which allows the document to drop its malicious payload. It's the first time Spora has been embedded in a document, rather than pulled from a web server.

spora-permissions.jpg

The malicious payload asking for permission to run.

Image: Deep Instinct.

See also: Ransomware: An executive guide to one of the biggest menaces on the web

Once executed, the payload is similar to earlier versions of Spora, in that it carries out the encryption - without adding or changing extension names - and deletes the shadow copies before presenting the victim with a ransom note.

Researchers say this latest version of Spora also collects browsing history and credentials from users' web histories and cookies, and has the ability to capture keystrokes.

While many other forms of ransomware - such as Cerber - are coded not to attack Russian users, Spora appears to be targeting Russia specifically. However, it's currently unknown who is behind Spora or where in the world they're operating from.

While the cryptography behind Spora is particularly strong, the phishing email messages are somewhat basic, meaning a user educated about threats should be able to avoid falling victim.

"Since Spora's attack vector relies on user interaction, users' awareness can play a significant role in stopping the threat. The basic rule of thumb is to pay special attention to unsolicited emails, attachments and avoiding from running or allowing any kind of content from an untrusted source," said Guy Propper, cyber intelligence researcher at Deep Instinct.

Before Spora or even Cerber, there were instances of ransomware families stealing data from victims, but the functionality is now finding its way into some of the most common ransomware families.

READ MORE ON CYBERCRIME



from Latest Topic for ZDNet in... http://ift.tt/2viTZTp