{"id":2566,"date":"2018-12-06T12:14:19","date_gmt":"2018-12-06T12:14:19","guid":{"rendered":"https:\/\/www.empowerbpo.com\/blog\/?p=2566"},"modified":"2023-02-27T09:32:43","modified_gmt":"2023-02-27T09:32:43","slug":"security-samsam-ransomware","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/security-samsam-ransomware\/","title":{"rendered":"How to Protect Your Network Against SamSam Ransomware Attacks"},"content":{"rendered":"<p><strong>Note<\/strong>:\u00a0We request users and network administrators to go through the documents listed at the bottom of this article, and share them with your cybersecurity experts. The three documents might help you review your security measures, and guard against SamSam ransomware attacks.<\/p>\n<p>As per the 2017 <a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/468115\/Campaigns\/2017-Ponemon-Report\/barkly-2017-state-of-endpoint-security-risk-ponemon-institute-final.pdf?t=1541697094525\" rel=\"nofollow noopener\" target=\"_blank\">State of Endpoint Security Risk<\/a> report, 77% of compromised attacks in 2017 were fileless malware attackers. Otherwise referred to as \u2018living off the land\u2019 tactics, these attacks make use of operating system features or legitimate network administration tools to victimize networks.<\/p>\n<p>Similar is the case with SamSam ransomware. The attackers behind the ransomware have made extensive use of such tactics to victimize networks. As per Symantec, SamSam has remained <a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/samsam-targeted-ransomware-attacks\" rel=\"nofollow noopener\" target=\"_blank\">highly active<\/a> throughout 2018. It has attacked a wide range of sectors- targeting 67 different organizations in whole; of which 24% were against healthcare organizations.<\/p>\n<p>Unlike malware attackers, the attackers avoid installing executable files \u2013 which AV solutions can scan and block \u2013 instead, they use exploits which infect endpoints without leaving a trace. In case of SamSam ransomware, the attackers use tactics which allow them to hide and prepare in plain sight on the target network, until they are ready to execute and spread the ransomware over the entire network.<\/p>\n<h2><strong>How to protect your network against the SamSam ransomware<\/strong><\/h2>\n<p>We suggest to you to go through the three documents listed below:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Living off the land and fileless attack techniques<\/a> by Symantec,<\/li>\n<li><a href=\"https:\/\/www.aha.org\/system\/files\/2018-04\/corrected-HCCIC-2018-002W-SamSam-Ransomware-Campaign.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Report on ongoing SamSam campaigns<\/a> by HCCIC, and<\/li>\n<li><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA18-337A\" rel=\"nofollow noopener\" target=\"_blank\">DHS and FBI alert<\/a> on activities related to SamSam.<\/li>\n<\/ul>\n<p>The Symantec report would help cybersecurity experts gain an insight into the \u2018living off the land\u2019 tactics used by the SamSam group, and <a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/white-papers\/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf\" rel=\"nofollow noopener\" target=\"_blank\">how you can protect your network<\/a> from such malicious attacks.\u00a0The HCCIC report is designed specifically to help you <a href=\"https:\/\/www.aha.org\/system\/files\/2018-04\/corrected-HCCIC-2018-002W-SamSam-Ransomware-Campaign.pdf\" rel=\"nofollow noopener\" target=\"_blank\">prepare against ransomware attacks<\/a>. And, the DHS and FBI alert shares <em>SamSam malware analysis reports<\/em> for four malware variants and the best practices for users and system administrators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note:\u00a0We request users and network administrators to go through the documents listed at the bottom of this article, and share them with your cybersecurity experts. The three documents might help you review your security measures, and guard against SamSam ransomware attacks. As per the 2017 State of Endpoint Security Risk report, 77% of compromised attacks [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2567,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[185,219,110,220,186,192],"class_list":["post-2566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec","tag-cybersecurity","tag-fileless-malware","tag-healthcare","tag-network-security","tag-ransomware","tag-samsam"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=2566"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media\/2567"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=2566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=2566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=2566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}