A new strain of ransomware — SCARAB — began hitting millions of inboxes last week; make sure your business knows how to protect against it.
Ransomware is now a household name, and there’s no going back. Even though cybercriminals have been using ransomware for years now, it wasn’t until the global Wanna Cry ransomware attack earlier this year that awareness reached critical mass – but that was just the beginning.
The latest development in the ever-evolving series of ransomware attacks uses the internet’s largest email spam botnet to propagate a relatively new ransomware known as “SCARAB”. This strain works similarly to the “Jaff” ransomware, relying on the now infamous Necurs botnet to reach millions of potential targets.
This threat was first detected by Forcepoint Security Labs as a part of a malicious email campaign that arrived in target inboxes on November 23rd at 7:30 AM UCT. From the time of the first detected email and over the following 4 hours, Forcepoint observed an increase in SCARAB emails from just under 100,000 separate incidents to nearly 350,000. At its peak, the SCARAB ransomware campaign was sending more than two million emails per hour. A vast majority of the emails carrying SCARAB are targeting .com addresses, followed by various European domains.
Identifying SCARAB – Look Out For This Email Subject Line
Ransomware emails sent by Necurs carrying SCARAB have the subject, “Scanned from {printer company name}”, a phishing ruse similar to those employed by cybercriminals involved in the Locky ransomware campaign. The includes a .zip file that is assumed to be a scanned document or image file but actually contains a VBScript downloader.
Once executed, SCARAB drops a copy of itself, creates a registry entry as an autostart mechanism, and encrypts files using a “.scarab” extension. The ransom note is then placed in every affected directory, named “WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS. TXT”.
Contradictory to other major ransomware campaigns, SCARAB does not necessarily state a specific monetary amount for the ransom, instead of saying, “the price depends on how fast you write to us”. Payment can be made through an email address, or through an alternative BitMessage contact mechanism.
What Can You Do To Protect Your Business From SCARAB?
As with any strain of ransomware, there are a few key steps you and your employees can take to protect your business:
Remember – you don’t have to do this alone. Dynamic Quest will help you set up robust backup solutions, develop cybersecurity response strategies, and help you protect against threats like SCARAB ransomware.
For more information about SCARAB and how to protect against it, contact Dynamic Quest!
More than 33 billion records will be stolen by cybercriminals by 2023, an increase of 175% from 2018.
40% of businesses will incorporate the anywhere operations model to accommodate the physical and digital experiences of both customers and employees (Techvera).
The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures “2022 Cybersecurity Almanac.”.
The three sectors with the biggest spending on cybersecurity are banking, manufacturing, and the central/federal government, accounting for 30% of overall spending (IDC).
The internal team was energized. With the Level 1 work off its plate, the team turned its attention to the work that fueled company growth and gave them job satisfaction.
The average cost of a data breach in the United States is $8.64 million, which is the highest in the world, while the most expensive sector for data breach costs is the healthcare industry, with an average of $7.13 million (IBM).
Forty-three percent of attacks are aimed at SMBs, but only 14% are prepared to defend themselves (Accenture).
It takes an average of 287 days for security teams to identify and contain a data breach, according to the “Cost of a Data Breach 2021” report released by IBM and Ponemon Institute.
We did a proof of concept that met every requirement that our customer might have. In fact, we saw a substantial improvement.
We did everything that we needed to do, financially speaking. We got our invoices out to customers, we deposited checks, all the things we needed to do to keep our business running, and our customers had no idea about the tragedy. It didn’t impact them at all.
“We believe our success is due to the strength of our team, the breadth of our services, our flexibility in responding to clients, and our focus on strategic support.”