<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img class="alignnone wp-image-2490" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/racoon.jpg" alt="racoon" width="289" height="289"></p> <p>The ThreatSTOP Security Team has introduced a new list of ransomware targets. <strong>We highly recommend customers update their policies to include these targets for immediate increased protection from the growing number of ransomware attacks.</strong></p> <!--more--> <p>Ransomware has emerged as the “hot topic threat” of the security industry, and rightfully so. Ransomware, a malicious software type that holds your system and/or data ransom, has affected millions with an estimated cost of <a href="http://www.zdnet.com/article/the-cost-of-ransomware-attacks-1-billion-this-year/">$1 billion</a> in damages to date.</p> <p>The profitability of ransomware has made it very attractive to attackers, and they are getting creative by developing a multitude of new ransomware variants that constantly keep us on our toes</p> <p>We at the ThreatSTOP Security Team are constantly working to identify new ransomware variants to update our protection and keep you safe. We have developed a list of new targets based on different ransomware family types to be incorporated into your policies.</p> <p>The data for our ever-growing lists of ransomware targets is curated from data supplied by our friends at the <a href="https://ransomwaretracker.abuse.ch/">abuse.ch</a> ransomware tracker.</p> <p>In this update, we have provided our customers with two types of targets:</p> <ul> <li>Four synthetic targets that contain aggregated data about different ransomware families that are available in ThreaSTOP’s standard mode</li> <li>Six Original targets that contain one ransomware family only and are available in ThreatSTOP’s Expert mode.</li> <li>And just to remind you – back in March – we added 2 <a href="https://blog.threatstop.com/2016/03/31/threatstop-critical-ransomware/">new targets</a> that are manually curated by our team and are available in ThreatSTOP’s expert mode and as part of the synthetic targets as well.</li> <li>All of the above are available in the policy editor.</li> </ul> <p>The new ransomware data includes the following families:</p> <p><strong><u>TeslaCrypt</u></strong></p> <p><strong>TeslaCrypt</strong> started out infecting computer game files, and was later updated to become a very strong mainstream ransomware. The TeslaCrypt authors <a href="https://blog.threatstop.com/2016/06/14/the-long-awaited-end-of-teslacrypt/">gave up the encryption keys in May 2016</a> so if a connection to one of its indicators appears in your reports, you will need to remove the infection from the afflicted machine. This can be done <a href="http://blog.talosintel.com/2016/06/teslacrypt-decryptor.html">using publicly available decryption</a> tools.</p> <p>TeslaCrypt indicators are included in:</p> <ul> <li>Original RPZ target – <strong>“</strong>TeslaCrypt Domains”</li> <li>Synthetic RPZ targets – “Ransomware Domains From abuse.ch” and <strong>“</strong>Ransomware Domains”</li> </ul> <p><strong><u>CryptoWall</u></strong></p> <p><strong>CryptoWall</strong>, which debuted in 2013, became the most prevalent ransomware variant after the fall of CryptoLocker in 2014, and remained the foremost ransomware variant in the world until mid-2016.</p> <p>CryptoWall indicators are included in:</p> <ul> <li>Original RPZ target - “CryptoWall Ransomware Domains”</li> <li>Synthetic RPZ targets – “Ransomware Domains From abuse.ch” and <strong>“</strong>Ransomware Domains”</li> </ul> <p><strong><u>TorrentLocker</u></strong></p> <p><strong>TorrentLocker</strong> is a ransomware variant that is distributed <a href="https://blog.threatstop.com/2016/03/23/torrentlocker-ransomware-still-going-strong/">via targeted emails with malicious attachments</a> or links being first observed in February 2014.</p> <p>TorrentLocker indicators are included in:</p> <ul> <li>Original RPZ target – “TorrentLocker Domains”</li> <li>Original IP target – “TorrentLocker IPs”</li> <li>Synthetic RPZ targets – “Ransomware Domains From abuse.ch” and <strong>“</strong>Ransomware Domains”</li> <li>Synthetic IP targets – “Ransomware IPs From abuse.ch” and “Ransomware IP Addresses”</li> </ul> <p><strong><u>Locky</u></strong></p> <p><strong>Locky</strong> has become one of the <a href="https://blog.threatstop.com/2016/04/08/locky-ransomware-domains-followup-research/">most prevalent ransomware variant</a>s in 2016, and is mainly spread in vast spam email campaigns.</p> <p>Locky indicators are included in:</p> <ul> <li>Original RPZ target - “Locky Domains”</li> <li>Original IP target – “Locky IPs”</li> <li>Synthetic RPZ targets – “Ransomware Domains From abuse.ch” and <strong>“</strong>Ransomware Domains”</li> <li>Synthetic IP targets – “Ransomware IPs From abuse.ch” and “Ransomware IP Addresses”</li> </ul> <p>Please Note: We only block C&amp;Cs and distribution sites for ransomware, and do not block the payments sites.</p> <p>All of our IP targets are available for both IP and DNS Firewall clients.</p> <p>Our RPZ targets are only available to the DNS Firewall customers – if you do not have a DNS Firewall, it’s time to upgrade. Contact us at 1-855-958-7867 or <a href="mailto:success@threatstop.com">success@threatstop.com</a></p></span>