Fifty new ransomware families have appeared in less than six months, according to a recent TrendMicro report.
Prior to 2016 there were about a dozen major ransomware families and very rarely would we see the release of a new variation. Recently however, we are witness to almost weekly releases of new ransomware variants, each trying to gain "market share" in the lucrative ransomware business.
This ransomware “population explosion” is making life very difficult for security vendors. Because of the way some security vendors designed and engineered their products, they are forced to chase each new ransomware family and its unique characteristics. Assuming that this approach was feasible when new ransomware appeared once a month or so – it clearly become a losing game.
At Minerva Labs we have a unique approach a paradigm shift in the battle against malware– the Environment Simulation Technology. The EST creates the impression that each endpoint is a sandbox and is protected by multiple high-end security products. The technology takes advantage of the fact that modern malware tries to remain undetected for as long as possible. It tries to avoid automated analysis in sandbox solutions and other sophisticated security products. Ransomware operators know that once they are caught by such solutions the gig is up! the infection infrastructure will be taken down, AV vendors will employ signatures that will detect their "product" and law enforcement agencies will hunt them down.
Using the ransomware's strength’s against itself is super-effective and in most cases the moment it meets a Minerva-protected endpoint it simply goes to sleep. However, we are well-prepared for the "stupid" ransomware, deploying without sending queries. Our ransomware protection module fills this gap, remediating ransomware damage in a generic manner even if the malware is not environmentally-aware.
To prove the effectiveness of our solution we decided to perform our mini-"real-world" test:
The results were as follows:
4. Locky (1)
5. Locky (2)
6. Pizzacrypts (1)
7. Pizzacrypts (2)
It is difficult to quantify performance against ongoing live malware campaigns, but we believe that the above results are clear. Minerva prevents most of the ransomware that is currently out there before even a single file was encrypted. On the rare occurrence of ransomware which is not environmentally aware we were able to restore all of the infected files. We didn't need any updates, we didn't block any URLs or known traffic patterns nor did we perform any CPU-heavy computations – yet, we were still able to prevent and remediate all of the malware we tested.