Researchers have discovered a type of malware that can easily bypass the security protocols of Windows 10. This malware is a new variation of ransomware called Snatch, and it comes with an added data stealer component. Designed to target corporate networks rather than consumers, Snatch has been modified to reboot your PC in Safe Mode to disable any security programs from initiating.

Who’s behind the Snatch ransomware?
According to the report released by Sophos, the threat actors responsible for the Snatch ransomware call themselves the Snatch Team on dark web message forums. The researchers observed this team posting appeals for affiliate partners on Russian language message forums. The cybercriminal group is looking to purchase network access intelligence so they can launch automated brute force attacks against unsuspecting enterprises.

What does Snatch do?
When this malware infects your computer, it installs a Windows service called SuperBackupMan. The SuperBackupMan is then executed, allowing hackers to use administrator access to run the BCDEDIT tool and force your computer to restart in Safe Mode. After restarting, Snatch then uses the Windows command vssadmin.com to erase all the Volume Shadow Copies on your system. This prevents you from recovering the files locked by this ransomware.

Aside from encrypting your data, Snatch is also capable of installing surveillance software, as well as stealing important business and personal information.

How to protect yourself from Snatch
Sophos offered several tips on how you can protect your business from this dangerous ransomware.

The severity of the risk posed by Snatch is something you should not ignore. Building a solid and secure network is not enough to protect your business from ransomware. Hackers are always looking for new ways to gain access to your system, which is why your security software solutions, backups, strategy, and training should adapt and keep up. If you want to learn more about how to step up your network security, contact us today.

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016