{"id":315,"date":"2018-12-05T20:20:00","date_gmt":"2018-12-06T01:20:00","guid":{"rendered":"https:\/\/www.kraftgrp.com\/uncategorized\/threat-advisory-samsam-ransomware\/"},"modified":"2019-09-28T16:56:01","modified_gmt":"2019-09-28T21:56:01","slug":"threat-advisory-samsam-ransomware","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/threat-advisory-samsam-ransomware\/","title":{"rendered":"Threat Advisory: SamSam Ransomware"},"content":{"rendered":"
SamSam Ransomware is becoming a massive problem for multiple industries across the United States. In fact, the problem is so big that The Department of Homeland Security, (DHS), National Cybersecurity and Communications Integration Center, (NCCIC), and the Federal Bureau of Investigation, (FBI), have all recently issued a\u00a0US-CERT alert<\/a>\u00a0due to the SamSam ransomware. Like other types of ransomware, files and networks are infected. In exchange for uninfected the system, hackers want a ransom, that typically costs thousands upon thousands of dollars. Every company that runs a network needs to be aware of SamSam ransomware. Here is what you need to know about this topic.<\/p>\n <\/p>\n What is SamSam Ransomware?<\/strong><\/p>\n SamSam ransomware is a type of ransomware that is designed to exploit Windows servers to gain access to your network. Once it is in the network, it uses the JexBoss Exploit Kit to access your JBoss applications. This type of ransomware is also able to use Remote Desktop Protocol to access your network. The virus is difficult to detect, due to the path it takes to access your system. Once the virus has made its way inside, hackers are able to get administrators rights, putting their malware on your server and basically hijacking your network. They do not release their hold on their network until you pay them the ransom they are asking.<\/p>\n What Can You Do to Decrease Your Chances of Getting SamSam Ransomware?<\/strong><\/p>\n It is extremely important that you take the correct precautions to decrease your chances of getting infected with SamSam ransomware.<\/p>\n One of the steps you can take is to enable strong passwords and an account lockout policy. If you have strong passwords and a good lockout policy in place, it makes it much harder for the software to hack into your system and infect it. Enabling multi-factor authentication can also help. Before any new software can be installed, before software can be wiped or before changes can be made to your network, authentication is needed. The more authentication levels you have, the harder it will be for any ransomware to infect your system.<\/p>\n Unfortunately, while you can decrease your chances of getting infected with SamSam ransomware, there is no way to prevent infection altogether. As such, it is essential that you regularly install system and software updates and maintain a great backup system for all of your data and systems. This way, if you do get infected, you have a recent back-up for all of your system and data. You can wipe your current, infected system and start fresh from your backup point, without losing much at all.<\/p>\n How Can You Learn More About SamSam Ransomware?<\/strong><\/p>\n If you are looking to learn more about SamSam ransomware, including the technical details surrounding it. It is highly recommended that you read through the SamSam Malware Analysis Reports that have been released by the US-CERT. A list of the reports, including links, are included here:<\/p>\n SamSam Ransomware is infecting computer systems and networks in multiple industries all across America. It is important that you learn what this ransomware is and how to protect yourself against it. Taking the right action can help to minimize the chances of your network being held ransom by SamSam ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":" SamSam Ransomware is becoming a massive problem for multiple industries across the United States. In fact, the problem is so big that The Department of Homeland Security, (DHS), National Cybersecurity and Communications […]<\/p>\n","protected":false},"author":1,"featured_media":316,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[131],"class_list":["post-315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-mediabytes"],"acf":[],"yoast_head":"\n\n