SamSam Ransomware Payment & Decryption Statistics
SamSam ransomware payments are typically much higher than the ransomware marketplace average. This is due to the specialized and bespoke nature of the attacks. SamSam hackers are known to not broadly syndicate their ransomware and pick their targets after close diligence.
SamSam Ransomware payment costs
Average Length of SamSam Incident
SamSam ransomware incidents are usually much shorter in duration than other attacks due to the streamlined communication, settlement, and decryption delivery that the hacker group has invested in.
SamSam Ransomware has a very high data recovery success rate after a ransom payment is made. The decrypter tools are relatively straightforward to use and run efficiently. There is nuance to determining the ID-host names that should be vetted carefully by an expert prior to paying though.
SamSam Ransomware Case Outcomes
Immediate SamSam Ransomware Help
Due to the targeted nature of SamSam ransomware, recovery efforts should be managed with the assistance of professional incident response service providers.
For immediate assistance contact us or call 24/7 Support: (203) 442-4050
SamSam Ransomware Frequently Asked Questions
1. Are there free SamSam decryption tools?
As of page publication (November, 2018) there are no SamSam decryption tools. If you submit a file example to us, we will have a look for free and let you know. There are also good free websites that you can upload a sample file to and independently check. You should NOT pay a data recovery firm or any other service provider to research your file encryption. They will use the same free resources noted above… so don’t waste your money or time! SamSam encrypts with AES / RSA, and then demands a ransom of 1 bitcoin or more to restore files.
This is an example of a tool provided by the hacker:
2. How did I get infected with SamSam?
Vulnerabilities are surfaced via a tool called JexBoss to detect vulnerable systems with older versions of JBOSS and then run attack for remote installation of a web shell. It identifies other connected servers to the network system and introduces the payload for file encryption on the network devices. SamSam encrypts on all computers in the network. SamSam launches on a compromised machine an executable (samsam.exe) and encrypts with a combination of AES-256 (CBC) + RSA-2096. Typical means on entry include unprotected RDP configuration, email phishing and malicious attachments, downloads, application patch exploits & vulnerabilities or web injections.
3. What are the known SamSam file extensions?
.3dm, .3ds, .3fr, .3g2, .3gp, .3pr, .7z, .ab4, .accdb, .accde, .accdr, .accdt, .ach, .acr, .act, .adb, .ads, .agdl, .ai, .ait, .al, .apj, .arw, .asf, .asm, .asp, .aspx, .asx, .avi, .awg, .back, .backup, .backupdb, .bak, .bank, .bay, .bdb, .bgt, .bik, .bkf, .bkp, .blend, .bpw, .c, .cdf, .cdr, .cdr3, .cdr4, .cdr5, .cdr6, .cdrw, .cdx, .ce1, .ce2, .cer, .cfp, .cgm, .cib, .class, .cls, .cmt, .cpi, .cpp, .cr2, .craw, .crt, .crw, .cs, .csh, .csl, .csv, .dac, .db, .db3, .dbf, .db-journal, .dbx, .dc2, .dcr, .dcs, .ddd, .ddoc, .ddrw , .dds, .der, .des, .design, .dgc, .djvu, .dng, .doc, .docm, .docx, .dot, .dotm, .dotx, .drf, .drw, .dtd, .dwg, .dxb, .dxf, .dxg, .eml, .eps, .erbsql, .erf, .exf, .fdb, .ffd, .fff, .fh, .fhd, .fla, .flac, .flv, .fmb, .fpx, .fxg, .gray, .grey, .gry, .h, .hbk, .hpp, .htm, .html, .ibank, .ibd, .ibz, .idx, .iif, .iiq, .incpas, .indd, .jar, .java, .jpe, .jpeg, .jpg, .jsp, .kbx, .kc2, .kdbx, .kdc, .key, .kpdx, .lua, .m, .m4v, .max, .mdb, .mdc, .mdf, .mef, .mfw, .mmw, .moneywell, .mos, .mov, .mp3, .mp4, .mpg, .mrw, .msg, .myd, .nd, .ndd,.nef, .nk2, .nop, .nrw, .ns2, .ns3, .ns4, .nsd, .nsf, .nsg, .nsh, .nwb, .nx2, .nxl, .nyf, .oab, .obj, .odb, .odc, .odf, .odg, .odm, .odp, .ods, .odt, .oil, .orf, .ost, .otg, .oth, .otp, .ots, .ott, .p12, .p7b, .p7c, .pab, .pages, .pas, .pat, .pbl, .pcd, .pct, .pdb, .pdd, .pdf, .pef, .pem, .pfx, .php, .php5, .phtml, .pl, .plc, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prf, .ps, .psafe3, .psd, .pspimage, .pst, .ptx, .py, .qba, .qbb, .qbm, .qbr, .qbw, .qbx, .qby, .r3d, .raf, .rar, .rat, .raw, .rdb, .rm, .rtf, .rw2, .rwl, .rwz, .s3db, .sas7bdat, .say, .sd0, .sda, .sdf, .sldm, .sldx, .sql, .sqlite , .sqlite3, .sqlitedb, .sr2, .srf, .srt, .srw, .st4, .st5, .st6, .st7, .st8, .std, .sti, .stw, .stx, .svg, .swf, .sxc, .sxd, .sxg, .sxi, .sxi, .sxm, .sxw, .tex, .tga, .thm, .tib, .tif, .tlg, .txt, .vob, .wallet, .war, .wav, .wb2, .wmv, .wpd, .wps, .x11, .x3f, .xis, .xla, .xlam, .xlk, .xlm, .xlr, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .ycbcra, .yuv
4. What does a SamSam ransom notice look like?
SamSam ransomware hackers will leave a notice behind that will be prominent and easy to find. It commonly looks like like the image to the right. It includes contact information for the hacker and instructions on how to purchase cryptocurrency to pay the ransom.
Note: We do not advise that any person or company contact a hacker and negotiate directly. Cyber criminals can be difficult to communicate with. Let a professional assist you.
RANSOMWARE FREQUENTLY ASKED QUESTIONS
WHAT INFORMATION DO I NEED TO PROVIDE?
You will need to provide information from both the ransom notice and a sample encrypted file. We will schedule a call to discuss the severity of the attack, the operability of your company and the likely timeline / cost of recovering from the attack. You will also need to provide identifying information on your company, and an authorized representative of your company.
HOW MUCH WILL THIS COST?
You are already being extorted; we don’t think you deserve to pay another large fee. Coveware charges flat daily service fees that vary based on the complexity of your case. We do not charge spreads of fees tied to the size of the ransom amount. Our fees will never be even close to the amount of the ransom demanded by the cyber criminal, and you should be skeptical of why any other service provider would charge a fee that high.
WHAT ABOUT FIRMS THAT HAVE TOLD ME THEY CAN DECRYPT MY FILES WITHOUT PAYING THE HACKER?
You should be extremely skeptical of any data recovery firm that claims they can decrypt ransomware. Typically they are just paying the cyber criminal without your knowledge and pocketing the difference between the ransom amount and what they will charge you. Know the facts before you engage. If the ransomware IS decryptable, the tool can be found for free. If not, purchasing a key from the cyber criminal is the only way to unlock your files. While Coveware does not condone paying cyber criminals, we recognize it is often the only choice if backups are not available or have become compromised as well. If that is the case, you deserve an honest, transparent experience.
WILL THE RANSOMWARE PAYMENT BE SUCCESSFUL?
There is no guarantee that paying the ransom will result in a working decryption tool being delivered. However, Coveware believes that data aggregation can help customers make the most informed data-driven decisions. Since we handle lots of cases of the same ransomware types, we are able to share our experiences and help customers decide how to proceed.
HOW DO I UNLOCK MY FILES?
If the ransomware payment is successful, a decryption tool & key is provided by the hacker that can be used to manually decrypt your files.
HOW DO I PREVENT THIS FROM HAPPENING AGAIN?
There are some common security mis-configurations that lead to a ransomware attack. We can share some tips and resources for preventing future attacks, but encourage companies to perform a full forensic review or security assessment as soon as possible. Consistent investment in security IT is the best antidote to preventing future attacks.
WHY CHOOSE COVEWARE?
Ransomware Recovery Services
RANSOMWARE RECOVERY PLAN: Provide some information on the severity of the attack, operability of your company and budget/ time and we'll chart you a set of options using our database of similar cases.
SETTLEMENT & RECOVERY: Coveware has access to a ready supply of any crypto currency, and offers a 15 minute disbursement service level agreement. We also support the decryption / data recovery process.
RANSOMWARE ASSESSMENT: Provide a few details from the ransom notice and an example encrypted file and we will provide context into the severity of the attack and your options for decryption and recovery. This is free.
HACKER NEGOTIATIONS: We have deep experience communicating and negotiating with hackers. Its what we do all day long! Take advantage of our experience and allow us to shoulder this burden.
WHAT OUR CUSTOMERS ARE SAYING
"Remediating a ransomware incident for a current or prospective client is stressful. The future of the client relationship, and sometimes the operability of the client's business are at stake. It is a lot of pressure for a managed service provider to take on, especially as downtime mounts. Coveware's solution shoulders a lot of that burden, dramatically improving the experience, and most importantly shrinking the time to recover."
- Adam Wipp, Helm MSP