SlideShare a Scribd company logo
Brief:
The malicious activities of Cerber Ransomware started in February 2016, and have continuously
evolved since then. Now it has become one of the most encountered ransomware families
pushing others including Locky behind. According to the latest statistics, Cerber has the highest
share rate of 25.97%. The evolution of this malware mostly happened through distribution
process with a focus on exploit kits, compromised websites, and email distribution. It is
especially prevalent in the US, Asia, and Western Europe.
Cerber Attack
Cerber generally enters the system/ PC through spam email down-loaders or malicious web
sites. Both macros and OLE objects are used to deliver Cerber. Malware authors can
malevolently use OLE or macros to deliver malware to the victims. It has been seen that
malicious files take the help of Visual Basic Script (VBS) and JavaScript to download Cerber from
a command server.
The other infection scenario is when any user visits a malicious website that hosts an exploit kit.
It finds out the vulnerabilities of the PC and targets those vulnerabilities to inject the infection.
Eventually, this allows the exploit kit to download Cerber in the PC. Neutrino, Angler and
Magnitude exploit kits are known for distributing Cerber.
Like other ransomware, Cerber also encrypts files and gives recovery instructions to the victim.
Cerber instructs both in .html and .txt formats and replaces the desktop wallpaper too. In
addition, Cerber includes a synthesized audio message. What is more important is that the
ransom message gives indications to the victims about Cerber trying to show Internet as a safer
place and they do not mention about the ransom to decrypt the files. After investigation, it has
been seen that the ransom appears in the form of bitcoins.
Solution
eScan, now debuts a Proactive Behavioral Analysis Engine (PBAE) that monitors the activity of
all the processes on the Local Machine and whenever PBAE encounters an activity or behavior,
which is reminiscent of a Ransomware, a red flag is raised and the process is rendered inactive
from conducting any further damage. However, Ransomware is also known to encrypt files
residing on the network share, in such cases, when an infected non-protected system is
accessing the Network Share of a protected system and tries to modify the files residing over
there, PBAE, will immediately invalidate the network session. Besides, the below precautionary
measures are also important:
 Update your antivirus software regularly and protect your system from Malware
attacks.
 Always download apps from their official website or Google Play Store instead of
unknown sources because of unreliability.
 Download applications of a reliable app developer. In addition, check the user ratings
and reviews of the app before download.
 Ensure that all the software installed in your system are updated frequently, including
Oracle, Java and Adobe.
 Implement a three dimensional security policy in your organization, i.e. firstly
understand your requirement based on which IT Security policy would be prepared
accordingly. Secondly, educate your staff about the policy and finally enforce it.
 Make sure you either implement MailScan at gateway level or enable Mail Anti-virus on
endpoint in order to block extensions such as *.EXE, *.SCR, *.JS, *.VBE etc. These
attachments would infect your system.
 Open emails only if you are positive about the source.
 Regularly create backup of your important files.

More Related Content

Viewers also liked

Viewers also liked (11)

Leukemia 2
Leukemia 2Leukemia 2
Leukemia 2
 
Cyfrowe Laboratoria Einstein
Cyfrowe Laboratoria EinsteinCyfrowe Laboratoria Einstein
Cyfrowe Laboratoria Einstein
 
Pitch for my magazine
Pitch for my magazinePitch for my magazine
Pitch for my magazine
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
Evaluation questions task 1
Evaluation questions task 1Evaluation questions task 1
Evaluation questions task 1
 
El uso de weblogs en la docencia universitaria
El uso de weblogs en la docencia universitariaEl uso de weblogs en la docencia universitaria
El uso de weblogs en la docencia universitaria
 
ABG (Emergency Medicine)
ABG (Emergency Medicine)ABG (Emergency Medicine)
ABG (Emergency Medicine)
 
Наукообразно
НаукообразноНаукообразно
Наукообразно
 
Dream film
Dream filmDream film
Dream film
 
A Disruptive Voice in the Post-Screen World
A Disruptive Voice in the Post-Screen WorldA Disruptive Voice in the Post-Screen World
A Disruptive Voice in the Post-Screen World
 
Resume Greg Benazech
Resume Greg BenazechResume Greg Benazech
Resume Greg Benazech
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (14)

The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 

Rise of Cerber ransomware

  • 1.
  • 2. Brief: The malicious activities of Cerber Ransomware started in February 2016, and have continuously evolved since then. Now it has become one of the most encountered ransomware families pushing others including Locky behind. According to the latest statistics, Cerber has the highest share rate of 25.97%. The evolution of this malware mostly happened through distribution process with a focus on exploit kits, compromised websites, and email distribution. It is especially prevalent in the US, Asia, and Western Europe. Cerber Attack Cerber generally enters the system/ PC through spam email down-loaders or malicious web sites. Both macros and OLE objects are used to deliver Cerber. Malware authors can malevolently use OLE or macros to deliver malware to the victims. It has been seen that malicious files take the help of Visual Basic Script (VBS) and JavaScript to download Cerber from a command server. The other infection scenario is when any user visits a malicious website that hosts an exploit kit. It finds out the vulnerabilities of the PC and targets those vulnerabilities to inject the infection. Eventually, this allows the exploit kit to download Cerber in the PC. Neutrino, Angler and Magnitude exploit kits are known for distributing Cerber.
  • 3. Like other ransomware, Cerber also encrypts files and gives recovery instructions to the victim. Cerber instructs both in .html and .txt formats and replaces the desktop wallpaper too. In addition, Cerber includes a synthesized audio message. What is more important is that the ransom message gives indications to the victims about Cerber trying to show Internet as a safer place and they do not mention about the ransom to decrypt the files. After investigation, it has been seen that the ransom appears in the form of bitcoins. Solution eScan, now debuts a Proactive Behavioral Analysis Engine (PBAE) that monitors the activity of all the processes on the Local Machine and whenever PBAE encounters an activity or behavior, which is reminiscent of a Ransomware, a red flag is raised and the process is rendered inactive from conducting any further damage. However, Ransomware is also known to encrypt files residing on the network share, in such cases, when an infected non-protected system is accessing the Network Share of a protected system and tries to modify the files residing over there, PBAE, will immediately invalidate the network session. Besides, the below precautionary measures are also important:  Update your antivirus software regularly and protect your system from Malware attacks.  Always download apps from their official website or Google Play Store instead of unknown sources because of unreliability.  Download applications of a reliable app developer. In addition, check the user ratings and reviews of the app before download.  Ensure that all the software installed in your system are updated frequently, including Oracle, Java and Adobe.  Implement a three dimensional security policy in your organization, i.e. firstly understand your requirement based on which IT Security policy would be prepared accordingly. Secondly, educate your staff about the policy and finally enforce it.  Make sure you either implement MailScan at gateway level or enable Mail Anti-virus on endpoint in order to block extensions such as *.EXE, *.SCR, *.JS, *.VBE etc. These attachments would infect your system.  Open emails only if you are positive about the source.  Regularly create backup of your important files.