Original Release Date: 3/9/2017
TLP: WHITE
The NJCCIC assesses with high confidence that organizations with insecure remote desktop protocol (RDP) configurations on their networks are at risk of infection with CrySiS ransomware and other variants that opportunistically seek out networks with poorly authenticated RDP access.
Since the beginning of 2017, 64 percent of ransomware incidents reported to the NJCCIC involved networks infected with the CrySiS variant. In addition to phishing emails, the hackers behind CrySiS are increasingly infecting victims by compromising remote desktop protocol (RDP) connections through brute force attacks and manually installing the malware onto a targeted system. Although files encrypted by earlier versions of CrySiS could be decrypted using a free, publicly available decryption tool, there is no publicly available decryption option for the current version. Therefore, in most cases, organizations impacted by CrySiS or other ransomware variants with no available decryption tool who do not have backups of their data face two options: accept the loss of their files or pay the ransom. The NJCCIC strongly discourages paying ransom of any kind, as it perpetuates the crime does not guarantee the restoration of encrypted files and, instead, encourages organizations to take proactive steps to reduce the risk of exposure to ransomware and limit the impact, if infected.
The NJCICC recommends all organizations implement a robust data backup and restoration plan, which mitigates the risk of data loss resulting from ransomware. Backups should be scheduled as frequently as possible, tested regularly, and stored off the network in a separate and secure location. To mitigate the risk posed by CrySiS and other ransomware variants that exploit RDP, organizations should restrict or completely disable unnecessary remote access options. If RDP is necessary, implement a two-factor authentication solution to prevent brute force attempts against login credentials. The following are basic security measures to prevent ransomware infections; a comprehensive list of mitigation strategies and information on ransomware variants is available on the NJCCIC’s Ransomware Threat Profile.
If your organization is impacted by CrySiS or any other ransomware variant, please report the incident to the NJCCIC using the Cyber Incident Reporting Form on our website or by calling (609) 963-6900 extension 7865.
Traffic Light Protocol: WHITE information may be distributed without restriction.