<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><strong>Cerber</strong> ransomware debuted in late February of this year, and has already become the third most prevalent ransomware based on a recent&nbsp;<a href="https://blog.fortinet.com/2016/05/26/cerber-ransomware-marks-its-presence-in-the-wild-catches-up-with-cryptowall-and-locky">Fortinet statistic</a>. The ransomware is typically distributed via emails containing macro-enabled Word documents, Windows Script Files, or Rich Text Documents. <strong>Cerber</strong> uses a strong, unbreakable encryption, and has a number of features that, when combined, make it unique in today's ransomware landscape.</p> <!--more--><p>The ransomware is being offered as "Ransomware as a service" on the Russian underground, meaning that various individuals can sign up to distribute it and share the profit with its authors. It is customizable using a configuration file, which lets the user of the ransomware change characteristics such as the ransom note and the attacked file extensions. This makes it possible for many different threat actors to use the same ransomware for different purposes and targets, each attack/campaign with it's own customized "look." <strong>Cerber</strong> does not need to connect to the control and command server to initiate file encryption, it can encrypt in offline mode.</p> <p><strong>Cerber</strong> authors have used an interesting scare tactic to get victims to pay - some versions included a script with an audio file that would repeat a verbal message over and over again, saying that all of the victim's files had been encrypted. Some ransom notes delivered verbal messages that quoted the Latin phrase "Quod me non necat me fortiorem facit" (What doesn’t kill me, makes me stronger).</p> <p>A new development of the ransomware potentially gives it botnet-creating capabilities, which can be used for DDoS attacks. Researchers at Invincea have seen a new variant of the ransomware quietly sending out huge amounts of network traffic from infected machines. Although this new feature has not yet been used for a full-scale DDoS attack, this is a dangerous new capability for this particularly powerful and insidious ransomware.</p> <p>ThreatSTOP customers are protected from <strong>Cerber</strong>.</p></span>