
The tech press is full of stories about “a new ransomware strain” called GermanWiper, that has hit German businesses hard in the last week.
GermanWiper, rather like a typical ransomware attack, arrives in your inbox in the form of an email. In this case samples have been seen purporting to be a job application from a person called Lena Kretschmer.
⚠️ Angreifer versenden aktuell gefälschte Bewerbungen im Namen von "Lena Kretschmer" zur Verbreitung der #Ransomware #GermanWiper. Nicht die Anhänge der Mail öffnen! ⚠️ pic.twitter.com/rpDBReqQYX
— CERT-Bund (@certbund) August 2, 2019
Sehr geehrte Damen und Herren,
mit großem Interesse bin ich im Internet auf Ihre ausgeschriebene Position aufmerksam geworden. Ich möchte mich gerne einer neuen beruflichen Herausforderung stellen. Mit mir gewinnt Ihr Unternehmen einen leistungsbereiten Mitarbeiter. Ich widme mich meinen neuen Aufgaben und Herausforderungen stets mit großer Motivation und vollem Einsatz. Einen Einstieg bei Ihnen zum nächstmöglichen Zeitpunkt steht nichts entgegen. Gerne gebe ich Ihnen einen weiteren Eindruck in einem persönlichen Gespräch. Ich freue mich über Ihre EinladungMit freundlichen Grüßen
Lena Kretschmer
Anlagen: Arbeitszeugnisse, Lebenslauf, Bewerbungsfoto
Attached to the email is a photograph (with the filename Lena_Kretschmer_Bewerbingsfoto.jpg), and a ZIP archive file (Unterlagen_Lena_Kretschmer.zip). Inside the ZIP file is a .LNK shortcut.
Clicking on the .LNK shortcut is, of course, a big mistake as your Windows computer will download a nasty malware infection from GermanWiper.
After it has done its dirty work, GermanWiper displays a ransom message requesting payment.

I did a reverse image search on the photograph attached to the email, and found this image by Berlin-based photographer Michel Buchmann, who – coincidentally – has a webpage describing how you should write a CV if you want to apply for a job in Germany.
It should go without saying that Michel and the model (whose real name apparently is Luisa) are not connected with the malware attack. Furthermore, the attack could easily be modified to use different wording, have a different applicant’s name, different filenames, even be written in a different language.
But there’s another important issue to consider with this malware attack. Because, many of the media reports are incorrect. GermanWiper is not ransomware. It’s worse than that.
GermanWiper is, as the name suggests, a type of malware known as a “wiper” – which overwrites data on your drives.
Compare that with ransomware, which encrypts your data. At least with ransomware you have the option – if you didn’t take the sensible precaution of making a secure backup before infection – of gambling that your malicious attackers might accept a ransom payment in exchange for a key to decrypt your precious data. With a wiper paying a ransom isn’t going to help you at all – the bad guys don’t have a copy of your data, they simply overwrote it with zeroes.
In other words, paying the attacker’s ransom demand is a waste of time (and money).
My advice? Make secure backups, folks.
Further reading: How to create a robust data backup plan (and make sure it works)
To learn more about backups, make sure that you listen to this episode of the “Smashing Security” podcast:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Recorded Future arms threat analysts, security operators, and incident responders to rapidly connect the dots and reveal unknown threats.
Their patented technology automatically collects and analyzes threat intelligence from technical, open, and dark web sources.
Sign up to their Cyber Daily newsletter and get the latest insights from Recorded Future at recordedfuture.com/intel.
Smashing Security for the 21st of September, 2017. I'm here, my name's Graham Cluley, and I'm joined by my good chum and co-host, Carole Theriault. Hello, Carole.
We're not gonna look at enterprise backups as such, but it's more sort of how you're gonna deal with your personal computer and devices and keeping those backed up.
And my question for you, and by that I mean you two, have you got a backup?
I do it because I just think it's a jolly good idea to have a backup and to make sure that that backup is secure as well.
And that if I need it, I can get back up and running as quickly as possible.
So I think the first thing is backups are great, but in many cases people haven't done a backup recently enough.
So you'll come across someone who's maybe accidentally overwritten some of their data or they've had a hard disk failure or maybe they've been hit by something like ransomware and you say to them, have you got a backup?
And they go, well, I did one last October or something like that. And that's a backup which is older than six months or something.
Because if you're relying on yourself or somebody else to manually do the backup, it ain't going to happen. You're sitting in front of a computer device, right?
Which is really good at remembering to do things and doing things on a schedule. Okay, the computers screw up things all the time.
But if it's a boring, mundane task, which frankly doing a backup is a boring, mundane task, if it's something which will be easy to forget, then get your computer to do it on a schedule instead.
Because when you haven't got any previous backup, if you're backing up your entire hard drive or all the files in your user folder or something like that, then that may take a while to put onto a device or upload to the cloud or wherever it is.
And we'll get into the different places maybe you should back up.
Once you've done that, then you begin to get into incremental backups where the backup may only be a backup of what has changed since the last full backup instead.
So I used to be a computer programmer. I remember way, way back, you know, 25 years or whatever, when I was programming on a computer which didn't even have a hard drive.
I was saving my source code onto floppy disks.
So I would have piles and piles of floppy disks, and I'd be so paranoid I was going to lose my work that I'd save it on this floppy disk, but then I'd have another floppy disk, which was a different color or labeled with something else.
And I'd have all these different versions and archives of past versions of my source code.
But that was kind of what it was like because I had nowhere else to put these things. You didn't have USB drives. You didn't have anything else. So you had to use this kind of medium.
But I knew that a floppy disk on its own wasn't reliable, and so I'd have multiple floppy disks.
And that's one of the first things which I think you need to recognize is that there is this danger that you will have an accident.
You will accidentally maybe make a mistake, or you will delete a file, or you will change some code, and you want to move back in time.
And so this is my sort of second rule is that if you've got a backup, if the only backup you have is inside your house or another drive which is on your desk, that's not really a backup.
I mean, yes, it might recover, it might save you from those sort of accidental deletion of data or something like that.
So I can understand things like photos, email, you know, some files, but just sounds like you won't have to back up your entire system. Is that necessary?
Applications you can reinstall from the original media or you can download those from the net if you need to. It's the files which actually belong to you, which you created.
So it'd be the photographs. Yeah, it will be— you said the emails actually, but a lot of people will be using a web-based email system.
You may want to back up your contacts details, your calendar perhaps. You may have databases, you may have Word documents.
I think maybe for the typical home user though, the most critical thing which you want to back up are probably things which are completely irreplaceable, which would be things like, for instance, legal documents, things like—
The number of times when people will be going to data recovery firms saying, "Look, I've had a hard drive crash or something's gone wrong and I can no longer get the photos of my kid." Do you know what?
One of the things they took was my laptop with all our pictures on it. You know, we had just got married, da da da.
Just by absolute chance, the week before, my other half had backed up all the pictures.
I just cared about having those.
So I'm responsible not just for the files on my computer, but my mother's computer.
And I'm also the person that saves all the photos and the videos that we've had transferred and taken from film and upgraded onto digital.
And last year when my father passed away, it became another additional thing of oh my gosh, if we lose all this stuff, that's what's left of our memories of my dad that are, you know, in photos and video.
So I have to make sure that this stuff is backed up really, really well. Otherwise, you know, I'm responsible if something goes wrong.
Been my mission to figure out a better solution. And admittedly, I don't have a great one. So this is why this episode's really interesting.
It's a good idea, but I would argue that it's not a real backup because it is still at risk.
Although it probably will avoid the accidental deletion or something like that, there are still other risks involved. One of those will be fire or flood.
The other risk, however, is ransomware.
Its whole raison d'être is to attack your most precious files, to lock them up, to make them inaccessible to you.
And if you have an accessible drive, a backup drive accessible from your computer, which is infected with ransomware, that ransomware will seek it out and it will encrypt your backup as well.
For this reason, I think you begin to start thinking, well, for these really important files, we need an offsite backup. We should put our backups at a different physical location.
And some people say, oh yeah, that's great.
What I'll do is every week I will take my USB drive, I'll take it to the office or something like that, or I will take it to Auntie Jean's and I'll put it somewhere safe over there because even if I suffer a data disaster, it won't be affecting her house as well.
Which sounds like a great idea in principle. I know many people do that. However, I think that is just going to go wrong as well.
You were always in a rush because you got so many things to do in your life and it just falls by the wayside. You need offsite backups which are automated. That's my belief.
Anyway, some Eastern European kids from 1969 who were juggling tables on their feet.
So backing up onto another local device is a good idea. And in my personal scenario, what I do is my computers wake up at 2 or 3 o'clock in the morning.
Any file which has changed gets backed up onto the storage device.
So then you have to figure out when is a good time for you to schedule this. And it has to be time when you yourself are also active.
I'm sure there are programs out there which will detect, oh, you're not doing anything between these hours, therefore I'm going to slowly start backing up to the drive.
But that means I've always got something. In fact, the particular system which I use, it basically clones the drive so that I've got a bootable drive.
Because for me, the thing about backups is not just getting your data back, it's about getting up and running again as soon as possible because it's going to affect my business.
And just doing a very quick update of whatever has changed. Why not do it?
And what's your plan B if, you know, there's a fire or you have a cyberattack or whatever?
You could do it onto a USB stick if you really wanted to, and then you could take it with you.
You also want to consider things like encryption, obviously, and your hard drive should be encrypted, yadda yadda. That's a whole different debate.
If you do do a cloud service, especially if you're using a third party or you want to back up, you want, and you want to protect that data, encryption is the layer you need, right?
There are some cloud services which obviously are making a living, have made a business out of working out what information they can learn about you and the potential for them to sell marketing data and so forth and do things like that.
Some cloud services don't, aren't interested in that, but some are interested in that.
So my general rule is that if I'm putting anything sensitive into the cloud, it's going to be encrypted before it gets transmitted to the cloud.
I'm not saying it's a good idea, but I don't.
You know, you could set it off running, do a backup first, just in case, obviously, in case it screws up.
It's probably more important on laptops than it is on desktop computers, because a laptop, you're taking to a restaurant, you're taking out to other people's work.
You can shove the sensitive files if you wish. So even if you don't want, I can't imagine why you wouldn't want to encrypt your entire hard drive, but if you didn't for any reason.
And I really should, I should, this is my job, you know? I should be doing these things, but I don't because I'm lazy.
But I guess in my mind, if the more of these things that I set up, the harder it is for me to check my backups to make sure they're actually working.
So when I weigh those risks, I'm like, I just need accessibility to be number one. Not to try to justify my poor choices in life.
I think these are really, really big things that people ask themselves, and it's great to hear Graham go "you should do this and you should do that." But there's the reality of it here too, right.
I just don't think it's going to happen. I think probably for most people, some sort of cloud backup solution is a good idea.
There are some very consumer-friendly solutions which will do this, little programs which will run in the background and will only back up the files which have changed.
And then if you have any kind of disaster, it could be a hardware disaster, it could be that you've overwritten a file, I find myself using online backup restoration all the time.
Because I'll have been doing a little bit of coding on my website or something, or I've deleted a file which I then realized, "ah, damn, that file I had 6 weeks ago, I really need it now," and I've put it into the trash can.
I can go to my online backup and it will dig it out for me.
If I was doing a restoration of all of my data, then yes, I'd use the online offsite backup. I'll tell you, I've been using one for years called CrashPlan.
It just runs in the background and never bothers me, and it tells me that it last did a backup 2 minutes ago.
So CrashPlan, just a couple of weeks ago, put out this message to their home user customers saying they're no longer going to be selling the consumer version.
If you want to keep with them, you have to upgrade to the small business version at least, which does cost more money.
And they've suggested that you could switch to some alternatives, and the one which they've sort of partnered with is an alternative called Carbonite, which doesn't do exactly what CrashPlan did.
Personally, I've decided, you know what, I'm going to stick with CrashPlan because I know it works.
But the concern which you have obviously is that some of these solutions can get expensive, particularly when you end up being responsible for lots of different computers as well.
Now there is a solution which is — well, there's a few solutions which are less expensive.
There's the CloudBerry solution, which is just a one-time purchase of a piece of software, which then uses your other cloud drive services, your Google Drive, your OneDrive, your Dropbox, and can use that space to put a backup into.
I should just sync my hard drive or my documents with Dropbox, which isn't a bad thing to do, and then use that as a backup. I don't really believe that is a backup.
But I don't think that is a backup.
And the reason is that if you get ransomware on one of your computers and encrypts the documents in your Dropbox, then it is going to sync all your encrypted documents to those other devices as well.
But another solution, if you want a cheaper solution for cloud backup, is to use cold storage services. And they give you really cheap data buckets which you can stuff your data in.
Again, it has to be encrypted. It does require more nerdiness than maybe some of these consumer products you just turn on on your computer.
And the way they make the bulk of their money is if you want to access the data.
Because with something like Glacier and the cold storage, you shove data in, but it might take 3 or 5 hours if you want to request a piece of data back, or you may have to spend more money to restore your data.
So if you're simply archiving, if you're imagining, well, actually I'm very rarely going to need these backups, but it would be nice to know that they're there, then that could be an option which you want to take up.
But, it's, you know, for that kind of storage, it's perfect.
So do check that out, guys, if you want to kind of review any of the suggestions, recommendations that we've provided in the show.
I guess the last thing we should mention is that a backup isn't a real backup unless you've tested it.
You can buy swag at smashingsecurity.com/store or join us on Facebook at smashingsecurity.com/facebook as well. Thank you very much, Maria, for joining us today.
Always a pleasure to have you on.
Recorded Future is the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.
Sign up for free daily threat intelligence updates at recordedfuture.com/intel.


Lena might be a tongue-in-cheek reference to Lenna
https://en.wikipedia.org/wiki/Lenna
which was a test image derived from a centerfold picture of Lena Söderberg.
https://en.wikipedia.org/wiki/Lena_S%C3%B6derberg
Ray, sounds like a stretch. However, if the next one is from a woman named "Teddi" that will definitely lend credence to the theory. :)
Why people don't learn the basics as: Don't open attachments from people you don't know or from emails you don't expect?
I use Linux and never had such problems.
Don't forget that, in this instance, the email purported to be a CV from someone applying for a job. HR departments find it perfectly normal to receive email attachments from people they don't know, applying for jobs.
Indeed, the soft underbelly of any organization is the HR department and the finance department. Both receive emails with attachments all the time and literally from everywhere and the only firewall capable of detecting if it's fake or not is the human behind the keyboard.
I'm actually surprised that this type of attack hadn't been tried earlier.
It's not that simple. There are many ways that one can be tricked into doing something. If you want to know the reason that social engineering and phishing is so commonly used you need only think about how easy humans are to manipulate. With not much thought you will know that it's used because it WORKS REALLY WELL. Kevin Mitnick knows this and it's what he is really good at. But never mind that.
As for Linux? Amusing that you think it's immune to malware. It's not. Never has been and never will be. Remember also that the infamous Morris Worm – from 1988 – exploited Unix boxes. There are other examples. Oh and let's see – what about some recent news? Maybe this?
https://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html?m=1
It seems that even downloading it – but not opening it (and I invite you to think on how that could be complemented with this attack because it's an instructive to understand how things can be combined to be even more effective and dangerous) – can lead to a RCE. If that doesn't say enough to you I don't think anything else will.
There's one other thing though to consider that's not even to do with safe computing: ignorance and lack of awareness. Ask yourself this too: if you're unaware of this type of thing how can you even know that you're unaware that there is even the possibility? And then there are those who are vulnerable. It's never as simple as you're making it out to be. Life simply isn't simple and it's actually better; if it was simple what would we really have in comparison to now?