SamSam ransomware has extorted $5.9M from victims since 2015

The ransomware variant SamSam has helped cyberattackers steal $5.9 million from victims since it first made rounds in late 2015, according to research from IT security company Sophos.

For the report, a team of Sophos researchers collaborated with various security vendors to collect data on SamSam ransomware attacks.

Most SamSam victims — 74 percent — are based in the U.S., and although attacks on medium- and large-sized organizations have captured headlines, these businesses only comprise half of SamSam victims. Many victims hail from healthcare (26 percent), government (13 percent) and education (11 percent). Sophos classified the remaining industries as those making up the "private sector," which comprised 50 percent of SamSam victims.

One of the most significant SamSam attacks involved Greenfield, Ind.-based Hancock Health. The hospital's computer systems were infected with the ransomware Jan. 11, and Hancock opted to pay the hackers roughly $55,000 in bitcoin to recover its files. At the time, Hancock Health President and CEO Steve Long was transparent about the hospital's decision to pay.

"My hope is that this retelling of the events will help shed light into the extraordinary efforts our organization mounted in response to a potentially disastrous event," he wrote in a blog post nearly two weeks after the incident.

The SamSam variant is not like most other ransomware strains. Instead of encrypting only document files, images and personal or work data, it also encrypts configuration and data files that run applications, forcing victims whose backup strategies only protect documents to first reimage the system. Moreover, SamSam attackers strategically select their targets instead of the more common method of dispersing spam emails.

"Every subsequent attack shows a progression in sophistication and an increasing

awareness by the entity controlling SamSam of operational security," the report reads. "The cost victims are charged in ransom has increased dramatically, and the tempo of attacks shows no sign of slowdown"

More articles on cybersecurity:

Federal cybersecurity lapses put patient data at risk, GAO report finds
Hackers deface a Kaiser website
UnityPoint breaches 1.4M patient's personal information after phishing attack

© Copyright ASC COMMUNICATIONS 2019. Interested in LINKING to or REPRINTING this content? View our policies by clicking here.

 

Top 40 Articles from the Past 6 Months