SentinelOne analyses splash ransomware ‘splash screens’
SentinelOne analyses splash ransomware ‘splash screens’

Key social engineering techniques – fear, authority, scarcity (or urgency) and humour – are among the drives exploited by cyber-criminals in ransomware attacks according to a new report examining ransomware ‘splash screens' – the initial warning screens of ransomware attacks.

SentinelOne has commissioned the report, “Exploring the Psychological Mechanisms used in Ransomware Splash Screens,” by Dr. Lee Hadlington PhD, senior lecturer of cyber-psychology at De Montfort University. It  reveals how social engineering tactics are used by cyber-criminals to manipulate and illicit payments from individuals.

Analysis of the language, visuals and payment types from 76 splash screens, highlights the following common trends:

  • Time criticality:  In over half the samples (57 percent), the ‘ticking clock' device – in which a specific amount of time is given to pay a ransom – was used to create a sense of urgency and to persuade the victim to pay quickly. Deadlines given ranged from 10 hours to more than 96 hours.

  • Consequences: The most likely consequence given for not paying the demand or missing the deadline was that files would be deleted and the victim would not be able to access them. In other screens, threats were made to publish the locked files on the Internet.

  • The Customer Service Approach: 51 percent of splash screens included some aspect of customer service, such as instructions on how to buy Bitcoins (BTC) or presenting frequently asked questions (FAQs). One example offers victims the chance to ‘speak to a member of the team'.

  • Imagery: The research also examines the use of a variety of imagery, including official trademarks or emblems, such as the crest of the FBI, which instil the notion of authority and credibility to the request.  One of the most prominent pop cultural images used was ‘Jigsaw' – a character from the Saw horror movie series.

  • Payment:  BTC was the preferred mechanism for payment; 75 percent of ransomware splash screens asked for payment in BTC. Over half the sample (55 percent) contained the ransom demand in the initial splash screen. The average amount asked for by attackers was 0.47 BTC (£972).

The report also examines the differing levels of sophistication on the part of the attackers and comes in the wake of recent global ransomware attacks which have struck both public sector and private organisations, causing massive disruption and costing businesses millions in lost revenue.  

“We know that psychology plays a significant part in cyber-crime - what's been most interesting from this study is uncovering the various ways that key social engineering techniques are used to intimidate or influence victims” said Hadlington. “With ransomware on the rise, it's important that we improve our understanding of this aspect of the attack and how language, imagery and other aspects of the initial ransom demand are used to coerce victims.”

“Although ransomware has leapt to the top of the public's consciousness following recent attacks, what's been less well documented is exactly how the criminals are manipulating their targets into paying up,” said Tony Rowan, chief security consultant at SentinelOne. “This report sheds light on the most common tactics used, with the aim that, through awareness, we are better placed to advise individuals and businesses how not to be duped by these criminals' claims.”