Last week, a nasty ransomware email showed up in my personal Gmail inbox.
As free services go, Gmail is pretty good at spotting phishing and ransomware emails.
However, they completely missed this one. It wasn't in my Spam folder, and it had none of the warnings from Google that it might be malicious.
Here's what it looked like:
If you're security-savvy, there's a lot of red flags in this email:
Sadly, most people aren't security-savvy. Your employees might see this email and get curious about how much money they're getting. Greed is a powerful motivator.
Let's take a look at this ransomware and why it slipped past Google.
The answer lies in the password.
By adding a password to the Word document, the attackers did something very smart. They made it so Google's scanners couldn't open the file. This is a technique that hackers are increasingly using to trick email antivirus.
If Google hasn't seen this exact file before, then it has no way to tell that it contains ransomware.
VirusTotal is an amazing resource for catching viruses and ransomware. It's actually owned by Google.
With a single click, you can scan any file against 58 different anti-virus engines.
The first thing I did is I uploaded this file to VirusTotal to see what it said.
Uh oh! VirusTotal has never seen this file before, so it doesn't know if it's a virus or not.
This is disappointing, but not surprising. Hackers produce millions of new viruses each month. All it takes is a trivial change to turn an old virus into a new virus that tricks the virus scanners.
Next, I pulled out the big guns.
I loaded the file to something called a "sandbox." A sandbox is basically a temporary computer in the cloud that opens a file and watches what it does. After it's done, the computer gets wiped clean, so there's no way that the file can do any real damage.
I used an excellent service from Payload Security called Hybrid Analysis. It analyzed the file and showed exactly what I was dealing with.
IMPORTANT NOTE: If you try to do this yourself, be EXTREMELY careful about how you handle the file. Make sure to delete it immediately from your local computer after you submit it to the sandbox. You don't want to see this file in the future, and try to open it because you don't remember what it is. Better yet, do this from a computer you don't use very often.
It's simple to use -- you simply upload the file...
Fill out a few fields on a form, and then it does it's thing.
Since I was dealing with a password-protected file, I had to do one extra thing.
I had to expand the "Analysis Options" menu:
And type in a command to tell it to enter the password from the email:
Now we're off to the races! Let's take a look at what the sandbox did...
First, the sandbox opened the file and popped in the password:
And we can see the "payload" in all its glory:
THESE are the actual ransomware files, and they would do huge damage to my computer if I opened them.
Instead, they're safely in the cloud, running on a temporary computer that will wipe itself clean after it runs this analysis. No real computers were harmed in the writing of this article.
Once I analyzed the files, I found that they contained a strain of ransomware called "VirLock."
This strain of malware is particularly nasty because:
Gmail's email anti-virus is pretty good for a free product, but it's not up to the task of protecting your business.
As a test, we forwarded this ransomware email to a Gmail account protected by the email security add-on that we recommend to our clients.
It worked like a champ.
As you can see from the screenshot below, it accurately classified this message as a Virus. It also blocked the email from being delivered to the user.
If you don't use email virus protection from a company that specializes in email security, your business is at risk. Email is the most common way that ransomware, data breaches, and other hacks start.
Have questions or feedback? Please share them in the comments below.
Like this article? Share it!
Leave a Reply