EXPERT COMMENTS: SNAKE Ransomware Targets Organizations’ Entire Corporate Networks

In response to the news that SNAKE ransomware is targeting entire corporate networks, expert offers perspective.

Experts Comments

January 09, 2020
Javvad Malik
Security Awareness Advocate
KnowBe4
Ransomware has proven to be very lucrative for cybercriminals and it appears some of their ill-gotten gains have funded advancements in ransomware tools. The Snake ransomware is one such example where criminals are trying to cause extra disruption by attempting to encrypt the entire network. Organisations should focus on the root cause on how ransomware enters the network. This is primarily through social engineering (mainly phishing), or by exploiting unpatched public-facing software. So if.....Read More
Ransomware has proven to be very lucrative for cybercriminals and it appears some of their ill-gotten gains have funded advancements in ransomware tools. The Snake ransomware is one such example where criminals are trying to cause extra disruption by attempting to encrypt the entire network. Organisations should focus on the root cause on how ransomware enters the network. This is primarily through social engineering (mainly phishing), or by exploiting unpatched public-facing software. So if they place resources into addressing these entry points, it is more likely they will prevent ransomware, and many other attack techniques.  Read Less
January 10, 2020
Tarik Saleh
Senior Security Engineer and Malware Researcher
DomainTools
Security researchers have observed samples of the new SNAKE ransomware family targeting organizations’ entire corporate networks. Discovered by MalwareHunterTeam and analyzed by Vitali Kremez, SNAKE is written in Golang and contains a high level of obfuscation. Upon successful infection, the ransomware deletes the machine’s Shadow Volume Copies before terminating various processes associated with SCADA systems, network management solutions, virtual machines and other tools. It then.....Read More
Security researchers have observed samples of the new SNAKE ransomware family targeting organizations’ entire corporate networks. Discovered by MalwareHunterTeam and analyzed by Vitali Kremez, SNAKE is written in Golang and contains a high level of obfuscation. Upon successful infection, the ransomware deletes the machine’s Shadow Volume Copies before terminating various processes associated with SCADA systems, network management solutions, virtual machines and other tools. It then proceeds to encrypt the machine’s files while skipping over important Windows folders and system files. As part of this process, it appends “EKANS” as a file marker along with a five-character string to the file extension of each file it encrypts.  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.