{"id":18335,"date":"2018-06-15T08:00:38","date_gmt":"2018-06-15T12:00:38","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18335"},"modified":"2022-04-27T15:05:54","modified_gmt":"2022-04-27T19:05:54","slug":"the-samsam-ransomware-is-behind-the-atlanta-attacks","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/the-samsam-ransomware-is-behind-the-atlanta-attacks\/","title":{"rendered":"The SamSam Ransomware is Behind the Atlanta Attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A virulent piece of malware called, <\/span><a href=\"https:\/\/www.wired.com\/story\/atlanta-ransomware-samsam-will-strike-again\/\"><span style=\"font-weight: 400;\">SamSam ransomware<\/span><\/a><span style=\"font-weight: 400;\"> has been spreading widely across the U.S. and is currently crippling the city of Atlanta, the Colorado Department of Transportation, and a number of healthcare organizations. Even though large organizations or municipalities have been victim to the ransomware, it most often starts with one employee unknowingly clicking on an infected link in an email. <\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/know-your-enemy-how-ransomware-payments-happen\/\"><b>Know Your Enemy &#8211; How Ransomware Payments Happen<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Be a responsible employee and citizen by protecting all your devices from potential attacks, including your Android phone. The best way to fight hackers is by installing a well-rated app like <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=samsam_ransomware_atlanta_attacks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">dfndr security<\/span><\/a><span style=\"font-weight: 400;\">, a full virus scan feature can check for any threats in your device, by scanning your files and even your SD card. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SamSam ransomware is like any strain of ransomware, mainly designed to encrypt data on a server or device and the only way to recover your data is by paying a \u201cransom\u2019 to have it returned. However, SamSam has some specific details you should know about.<\/span><\/p>\n<p><b>It Spreads Quickly<br \/>\n<\/b><span style=\"font-weight: 400;\">Most ransomware is sent by sending one copy of the malware to thousands of possible victims over the course of a day or two. However, the hacking creators of SamSam ransomware did something different &#8211; they sent thousands of copies of the malware to computers within a single organization at once.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the organization was infected, the hackers offered a \u201cdiscount\u201d to restore the company data all at once. Many cybercriminals use the \u201cspray and pray\u201d technique &#8211; attack an organization and hope for fresh victims. But the perpetrators of the SamSam ransomware attacks specifically targeted organizations with glaring vulnerabilities or weak credentials. <\/span><\/p>\n<p><b>What Did They Exploit?<br \/>\n<\/b><span style=\"font-weight: 400;\">The SamSam ransomware attacks exploited bugs that organizations are not aware of, or had missed in their IT security plans. They also rolled out brute-force attacks against the Remote Desktop Protocol, a Microsoft software that allows two computers to remotely connect. This allowed them to gain access to unauthorized networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ransomware was then spread to other connected networks through network mapping and credential theft. <\/span><\/p>\n<p><b>What Can You Personally Do?<br \/>\n<\/b><span style=\"font-weight: 400;\">Always follow your IT department\u2019s recommendations on having strong credentials, by creating passwords that are at least 8 characters long with some combination of lower-case and upper-case letters, as well as numbers and symbols. Ideally, use all randomized characters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take the stance of \u201cdefensive computing,\u201d which helps protect you from malware, <\/span><a href=\"https:\/\/www.nytimes.com\/2018\/01\/11\/technology\/personaltech\/ransomware-protection.html\"><span style=\"font-weight: 400;\">ransomware and phishing attacks<\/span><\/a><span style=\"font-weight: 400;\">. Don\u2019t open links and files from people you don\u2019t know or from \u201cfriends\u201d who\u2019ve sent you odd messages (cause the person may have been hacked!). Heed company protocols on backing up corporate files regularly and stored off-site, so if an attack were to happen, the impact could be lessened.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This virulent malware has been targeting organizations across the U.S. Yours could be next.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,358,545,249],"class_list":["post-18335","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-protection","tag-safety","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18335"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18335\/revisions"}],"predecessor-version":[{"id":18803,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18335\/revisions\/18803"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}