Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Both the Federal Bureau of Investigation and the Department of Homeland Security have issued alerts for the ransomware, also known as MSIL/Samas.A. The alert was issued on December 3, 2018, and outlines an attack on multiple industries, some with crucial infrastructure. The ransomware has been in the news as of late, as two Iranian nationals, Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri were indicted by a U.S. grand jury in New Jersey for ransomware attacks on the Colorado Department of Transportation.

The pair is alleged to have victimized over 200 hospitals, businesses, government agencies, and schools in the U.S. and Canada beginning in 2015; extorting over $6 million over that time. In addition to these charges, the two hackers have now been indicted by the state of Georgia on charges that they were the ones that perpetrated the ransomware systems that crippled Atlanta’s government in March of 2018. By taking almost 3,800 of the City of Atlanta’s computers hostage, prosecutors state that Mansouri and Savandi have cost the city millions of dollars in consultant fees, downtime, and other costs.

What is SamSam?
SamSam is a privately developed ransomware that is being used to target specific companies selected by the developers. This means that it isn’t just a commodity ransomware, it can’t be found on some type of criminal forum on the dark web, and it isn’t sold as a service like many other forms of ransomware. This is a major problem for any organization that is targeted, as none of the typical endpoint defensive strategies work to stop it.

What’s worse, is that that once a SamSam strain is used, and security vendors publish a report, another SamSam strain is developed. It is thought that this development team includes the two hackers implicated in the Colorado DoT crimes, the Atlanta crimes, and hundreds of other attacks over the past three years.

What Can You Do?
Thus far the SamSam ransomware has entered victims’ networks using exploits in web-facing servers. It has been deployed as millions of other pieces of malware as an executable file that is mistakenly unleashed, or via brute force via the Remote Desktop Protocol. So, while you can lock down your RDP, your best bet is to have a dedicated strategy that:

  • Doesn’t allow unauthorized users to have administrative privileges
  • Limits use of Domain Access accounts to administration tasks
  • Doesn’t provide service accounts for important services
  • Restricts access to critical systems

If you are diligent in your organizational cybersecurity practices, you should be able to conduct business as usual without having to worry about ransomware, SamSam or otherwise. If you are interested in knowing more about SamSam and how to stop it, contact the IT professionals at Symmetric Engineering Group for more information at (813) 749-0895.

Why You Shouldn't Say “Humbug” to Your Security
Small Businesses Using Emerging Technologies to Ge...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Technology Best Practices Managed IT Services Cloud Business Computing Malware Email Privacy IT Infrastructure Management Hackers Business Continuity Hosted Solutions IT Companies in Tampa Internet Business IT Support Services Business Mobility Software Outsourced IT Data Business IT Solutions Data Backup I.T. Management Microsoft Network Security Productivity IT Professional Services Productivity Managed Service Provider Custom Business Solutions Mobile Devices Computer Tech Term IT Management IT Business Solutions Ransomware Business Applications Data Recovery Innovation Technology Consultants Managed IT Service Business IT Support Managed IT Hardware Google Android Windows 10 Managed IT Service in Florida Internet of Things Cloud Computing Windows Disaster Recovery User Tips Managed Services in Florida I.T. Support IT Support Services in Tampa Workplace Tips IT Risk Management Remote Monitoring Browser Small Business Communication I.T. Services Dynamic Solutions Backup Encryption Holiday Upgrade Smartphone IT Outsourcing in Tampa IT Services in Florida IT Support Data Management Smartphones Collaboration Gmail Artificial Intelligence Business Management Server Microsoft Office IT Support in Tampa Network Efficiency Social Media Managed Services Save Money IT Service VoIP Passwords Phishing BYOD IT Managed Services Mobile Device App Paperless Office Managed Services in Tampa Bay Cybersecurity Managed IT Services Windows 10 Mobile Device Management Tech Companies in Tampa Website IT Services in Tampa BDR Applications Unified Threat Management Antivirus Operating System Firewall communications Tampa IT Support Office 365 Bring Your Own Device Bandwidth Customer Relationship Management Vendor Management Employer-Employee Relationship IT Service Management Tip of the week Data Computer Services IT Company Business Plan Government Wi-Fi Chrome Compliance IT Vendor Management Word Two-factor Authentication IT Outsourcing Business IT Support Services Project Management Scam Vulnerability Small Business IT Solutions Managed Service in Tampa Content Filtering Facebook Computer Networking Healthcare IT Outsourcing in Florida Apple Infrastructure Risk Management SaaS Router Retail The Internet of Things Information Quick Tips WiFi Customer Service Saving Money Remote Computing Analytics Mobile Computing Data storage Document Management Hosted Solution Office Storage Regulations Data loss IT Management Services IT solutions Automation Miscellaneous IT Company Unified Communications Help Desk Big Data Robot Telephone Systems Settings Money Computer Hardware Repair Maintenance Data Security Blockchain Wireless Wireless Technology Managed Service I.T. Company Network Congestion Business Application Computer Networking Services Administration Social Uninterrupted Power Supply Flexibility Machine Learning Licensing Training Downtime Employees Virtual Desktop Computing Company Culture Redundancy How To Monitors Access Control HIPAA Patch Management IoT File Sharing YouTube Digital Payment Server Management Virtualization Office Tips Outlook Network Management IT Consulting Search Internet Exlporer Spam Managed IT Outsourcing Net Neutrality Files Apps Users Tablet IT Support Helpdesk Budget User Error Business Continuity Services Microsoft Virtual Server Hosting in Tampa and Florida Mobile Security Assessment Virtual Private Network Remote Monitoring and Management IT Management Service Recovery Presentation Smart Technology Information Technology Solid State Drive Virtual Reality Politics Alert Mobility IT Companies in Florida VPN LiFi Printing Business Technology Remote Workers Augmented Reality IBM End of Support Laptop Google Drive Computer Support Computer Network Services Mouse Language Geography Authorization Cyber Monday G Suite Password Knowledge Corporate Profile Techology Google Docs Mobile Favorites Electronic Medical Records Google Calendar Chatbots Help Desk Support Automobile Fun Address Fleet Tracking Procurement Lenovo Permissions Server Hosting in Tampa Hacking Buisness Cache Electronic Health Records Display Full Service IT Printer Wearable Technology Healthcare IT Shortcut Test IT Solutions for Small Business Break Fix Connectivity Point of Sale Typing Save Time Disaster Resistance Computing Infrastructure Hacker Undo Cryptocurrency Humor Servers High-Speed Internet Modem Experience Deep Learning WannaCry Monitoring Time Management Conferencing Data Technology Legislation Identity IT Tech Support Hacks Hard Disk Drive Asset Tracking Security Cameras Superfish Fraud Trending Recycling Cyberattacks IT Support Companies in Tampa Domains Co-managed IT Software Tips MSP RMM Microsoft Affiliate Program Dark Web Samsung History User Halloween Backups Proactive IT Alerts Chromebook Business Growth Competition Bitcoin Development Zero-Day Threat Software as a Service Cookies Managed it Services in Tampa Travel Best Practice Google Wallet Star Wars Consulting CIO Business Continuity Service Providers Identity Theft Managing Stress Instant Messaging Writing Comparison IT Vendor Management in Tampa Sync Technology Consulting Firms Current Events OneNote Remote Worker Server Hosting in Florida Server Hosting Digital Signature Hard Drives Computer Care Firefox eWaste Read Only SharePoint IT Technicians IT Support and Solutions Private Cloud Public Speaking Proactive Tech Terms Microsoft Business Solutions Data Warehousing Disaster Avoiding Downtime Scary Stories Information Technology Consulting Legal Data Breach Cooperation Managed Services in Floirda Windows 8 Professional Service Statistics Cables Backup and Disaster Recovery Dark Data Technology Tips Nanotechnology Managed Service Providers Heating/Cooling Identities Drones VoIP Utility Computing Managed Services Provider Touchscreen Enterprise Content Management Finance Social Engineering Specifications Social Networking Network Support in Florida Mobile Device Managment Going Green Application Employee-Employer Relationship ROI Tampa IT Services Networking Management Careers Downloads Mirgation IT Managed Service in Tampa Programming Top IT Outsourcing Company Cabling Theft Microsoft Excel Gadgets Sports Computer Repair IT Consulting Services Health Care IT Services Technology Laws Staff IT Company in Tampa Websites Safety Marketing IT Managed Service Provider Google Maps Bluetooth Wires Human Error Consulting Services Screen Reader Tech Company in Tampa Meetings Intranet Digital E-Commerce Cost Management IT Consulting Service Vulnerabilities Authentication Black Friday Motherboard Cortana Outsourced Computer Support Hotspot Consultation Enterprise Resource Planning Bookmarks IT Service in Tampa Jobs Multi-Factor Security Migration Help Desk Support in Tampa Tech Support Education USB Mail Merge WPA3 Financial Features Computers Business IT Solutions Unified Threat Management Operations Managed Service in Florida Health Permission Service IT Distributed Denial of Service Smart Tech Alt Codes Spyware Hard Drive Telephony Saving Time Supercomputer Tracking Emoji Regulation Processors Running Cable Thank You CrashOverride Update IT Budget Black Market Business Appplications Administrator Managed Servers Work/Life Balance Relocation 5G Unsupported Software Web Server Congratulations Cleaning IP Address Virus Physical Security Law Enforcement Personal Information Mobile Data Notifications Mobile Office How To Motion Sickness Cameras Gadget IT Consultant Refrigeration Hiring/Firing Emergency Staffing Printers Error Upgrades CCTV GPS Public Cloud I.T. Managament Lithium-ion Battery Notes Crowdsourcing Botnet 3D Printing Twitter Webcam Cybercrime Taxes

Latest Blog Entry

The right technology can be a catalyst for change. While the right kind of change can be enough to drive innovation and push the limits of your business, the wrong kind of change--namely, employee turnover--can put a halt to productivity and force you to trace your steps bac...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login