{"id":11058,"date":"2018-05-07T08:28:14","date_gmt":"2018-05-07T12:28:14","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/synack-ransomware-featured\/11058\/"},"modified":"2020-03-30T16:08:15","modified_gmt":"2020-03-30T12:08:15","slug":"synack-ransomware-featured","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/synack-ransomware-featured\/11058\/","title":{"rendered":"SynAck ransomware: The doppelg\u00e4ngster"},"content":{"rendered":"<p>Malware tends to evolve, with crooks adding new functions and techniques to help it avoid detection by antivirus programs. Sometimes, the evolution is rather rapid. For example, SynAck ransomware, which has been known since September 2017 (when it was just average, not particularly clever), has recently been overhauled to become a very sophisticated threat that avoids detection with unprecedented effectiveness and uses a new technique called Process Doppelg\u00e4nging.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Sneak attack<\/h2>\n<p><\/p>\n<p>Malware creators commonly use <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/obfuscation\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">obfuscation<\/a> \u2014 attempts to make the code unreadable so that antiviruses will not recognize the malware \u2014 typically employing special packaging software for that purpose. However, antivirus developers caught on, and now antivirus software effortlessly unpacks such packages. The developers behind SynAck chose another way that requires more effort on both sides: thoroughly obfuscating the code <em><em>before compiling it<\/em>,<\/em> making detection significantly harder for security solutions.<\/p>\n<p>That\u2019s not the only evasion technique the new version of SynAck uses. It also employs a rather complicated Process Doppelg\u00e4nging technique \u2014 and it is the first ransomware seen in the wild to do so. Process Doppelg\u00e4nging was first presented at <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/black-hat-2017\/\" rel=\"noopener noreferrer nofollow\">Black Hat 2017<\/a> by security researchers, after which it was picked up by malefactors and used in several malware species.<\/p>\n<p>Process Doppelg\u00e4nging relies on some features of the NTFS file system and a legacy Windows process loader that exists in all Windows versions since Windows XP, letting developers create fileless malware that can pass off malicious actions as harmless, legitimate processes. The technique is complicated; to read more about it, see <a target=\"_blank\" href=\"https:\/\/securelist.com\/synack-targeted-ransomware-uses-the-doppelganging-technique\/85431\/\" rel=\"noopener noreferrer\">Securelist\u2019s more detailed post<\/a> on the topic.<\/p>\n<p>SynAck has two more noteworthy features. First, it checks if it\u2019s installed in the <em><em>right<\/em><\/em> directory. If it\u2019s not, it doesn\u2019t run \u2014 that\u2019s an attempt to avoid detection by the automatic sandboxes various security solutions use. Second, SynAck checks if it\u2019s installed on a computer with a keyboard set to a certain script \u2014 in this case, Cyrillic \u2014 in which case it also does nothing. That\u2019s a common technique for restricting malware to specific regions.<\/p>\n<p><strong><\/strong><\/p>\n<h3>The usual crime<\/h3>\n<p><\/p>\n<p>From the user\u2019s perspective, SynAck is just more ransomware, notable mainly for its steep demand: $3,000. Before encrypting a user\u2019s files, SynAck ensures it has access to its important file targets by killing some processes that would otherwise keep the files in use and off limits.<\/p>\n<p>The victim sees the ransom note, including contact instructions, on the logon screen. Unfortunately, SynAck uses a strong encryption algorithm, and no flaws have been found in its implementation, so there is no way yet to decrypt the encrypted files.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/05\/07162856\/synack-logon-screen.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/05\/07162856\/synack-logon-screen.png\" alt=\"\" width=\"941\" height=\"517\" class=\"aligncenter size-full wp-image-11061\"><\/a><\/p>\n<p>We have seen SynAck distributed mostly by Remote Desktop Protocol brute force, which means it\u2019s mostly targeted at business users. The limited number of attacks thus far \u2014 all of them in the USA, Kuwait, and Iran \u2014 bears out this hypothesis.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Getting ready for the next generation of ransomware<\/h3>\n<p><\/p>\n<p>Even if SynAck is not coming for you, its existence is a clear sign that ransomware is evolving, becoming more and more sophisticated and harder to protect against. Decryptor utilities will appear less frequently as attackers learn to avoid the mistakes that made the creation of those decryptors possible. And despite ceding ground to hidden miners (<a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/20135\/\" rel=\"noopener noreferrer nofollow\">just as we predicted<\/a>), ransomware is still a big global trend, and knowing how to protect against all such threats is a must for every Internet user.<\/p>\n<p>Here are a few tips that can help you avoid infection or, if necessary, minimize the consequences.<\/p>\n<ul>\n<li>Back up your data regularly. Store backups on separate media not permanently connected to your network or to the Internet.<\/li>\n<li>If you do not use Windows Remote Desktop in your business processes, disable it.<\/li>\n<li>Use a good security solution with a built-in firewall and specific antiransomware components, such as <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> for small business or <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security<\/a> for bigger companies. Kaspersky Lab\u2019s products detect SynAck despite its evasion strategies.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n<ul>\n<li>If you already have another security solution installed, you can still install <a href=\"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=me-en_KB_nv0092&amp;utm_content=link&amp;utm_term=me-en_kdaily_organic_1drobvqxak929hs\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a>, which is free and compatible with security suites from other vendors.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>This new version of SynAck ransomware uses sophisticated evasion techniques.<\/p>\n","protected":false},"author":675,"featured_media":11059,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,5,1917,1486],"tags":[261,1768,433,1769,1770,1771],"class_list":{"0":"post-11058","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-news","9":"category-smb","10":"category-threats","11":"tag-encryption","12":"tag-endpoint","13":"tag-ransomware","14":"tag-rdp","15":"tag-synack","16":"tag-targeted"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/synack-ransomware-featured\/11058\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/synack-ransomware-featured\/13253\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/synack-ransomware-featured\/15324\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/synack-ransomware-featured\/13601\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/synack-ransomware-featured\/12932\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/synack-ransomware-featured\/16078\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/synack-ransomware-featured\/15641\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/synack-ransomware-featured\/20530\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/synack-ransomware-featured\/4907\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/synack-ransomware-featured\/22323\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/synack-ransomware-featured\/10477\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/synack-ransomware-featured\/10326\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/synack-ransomware-featured\/16652\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/synack-ransomware-featured\/20327\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/synack-ransomware-featured\/20219\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/synack-ransomware-featured\/20215\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11058"}],"version-history":[{"count":7,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11058\/revisions"}],"predecessor-version":[{"id":16262,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11058\/revisions\/16262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11059"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}