Skip to main content

Hackers are playing Crysis on remote business computers, and it’s not a fun game

A hacker inputting code into a system.
Image used with permission by copyright holder
At one time there was ongoing joke in the gaming industry about whether a PC can run Crysis, a first-person shooter from Crytek that was essentially ahead of its time. After its launch in 2007, the game was unplayable on high-end hardware when set at its high resolutions and settings, thus the game became a benchmark for years. Since then, technology has caught up, and now the “Crysis” name has resurfaced in the form of ransomware that is now attacking businesses in Australia and New Zealand.

Although Crysis originally surfaced back in February, these latest attacks were first discovered by Trend Micro in early August. It’s distributed through spam emails packed with a Trojan-based attachment or a link to a compromised website. It also lurks on websites that distribute fake installers for valid programs and applications sold through retail.

Recommended Videos

However, the security firm also discovered that the hackers behind the latest attacks are sneaking Crysis into business networks through the Remote Desktop feature built into the Windows platform. This service allows the user to remotely access another Windows machine as well as other local devices and resources like printers, the Clipboard, plug and play media, and more. A remote computer’s hard drive can even be shared (mapped), allowing other users to access the drive’s contents as if it’s installed in their machine.

According to Trend Micro, the hackers are grabbing Remote Desktop credentials by using brute force attacks, a method that employs software to continuously guess a password until the correct one is determined. Once hackers gain access to a remote computer, they use Crysis to encrypt the computer’s local files, forcing companies to shell out big bugs to regain access.

However, Trend Micro reports that Crysis can be used on an even larger scale. Once it encrypts the files on a remote computer, it has the ability to scan for mapped drives, removable drives, and other devices on the network, and infect those as well. Crysis could eventually migrate to the company’s file server and hold its contents hostage for even bigger bags of cash.

“Cleanup from Crysis has been noted to be tricky. In its attacks on Australian and New Zealand businesses, we saw this ransomware injecting Trojans to redirected and/or connected devices such as printers and routers,” the security firm reports. “This part of Crysis’ infection chain allows the attackers to regain access to and reinfect the system, even after the malware has been removed from the affected computer.”

That means if a business pays the hackers money to regain access to their files, those hackers can re-encrypt the files again. Trend Micro recommends that companies located in Australia and New Zealand should shut down access to Remote Desktop, or change the port that the Remote Desktop protocol (RDP) is currently using. Companies should also beef up Remote Desktop credentials and enforce two-step authentication, which requires a second form of identification on top of the Remote Desktop login credentials.

“Ensuring that connected devices are securely wiped during cleanups can mitigate the risks of further damage, while utilizing encryption channels can help foil attackers from snooping on remote connections,” the firm adds. “Keeping the RDP client and server software up-to-date can also prevent potential vulnerabilities in RDPs from being exploited.”

Naturally, Trend Micro has the perfect solution for keeping Crysis off a company’s network: its service for enterprises, and its service for small to medium-sized businesses.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
At basically $105, the Ryzen 5 7600X is the best gaming CPU to buy right now
The Ryzen 5 7600X sitting among thermal paste and RAM.

I don't usually get my hopes up for Black Friday CPU deals, but I found one that's just too good to pass up. Right now, you can get the Ryzen 5 7600X -- still one of the best processors for value-focused gaming -- for basically $105. No, that's not the actual price listed on Newegg where you'll find the deal, but there's a lot going on with this sale.

For starters, the CPU itself is marked down by 24%, bringing the $299 list price down to $225. Not a great deal for a last-gen chip. However, you can save an additional $30 by using the promo code BFEDY2A33, and more importantly, you'll get a free Kingston NV3 1TB hard drive with the order. That's a PCIe 4.0 SSD that normally costs $90.

Read more
This Asus laptop with Copilot+ is $350 off at Best Buy
Asus Vivobook S 15 CoPilot+ front view showing display and keyboard.

You can do quite a bit of gaming on the go these days, thanks to all the handheld consoles and gaming laptops that are on the market. Regarding the latter, we’re always on the lookout for top discounts on the gaming gear we all want to own, which leads us to this wonderful discovery:

For a limited time, when you purchase the Asus Vivobook S 15 with Copilot+ at Best Buy, you’ll pay $550. At full price, this model sells for $900. We tested this PC earlier this year, and our reviewer said the following: “The Asus Vivobook S15 is the best large-display Copilot+ laptop so far in an old-school form factor.”

Read more
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more