Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Alert: Angler Exploit Kit Spreads CryptoWall 4.0 via New Drive-By Campaign
Heimdal Security ^ | December 2nd, 2015 • 11:23 | Andra Zaharia

Posted on 12/07/2015 4:46:21 AM PST by rarestia

Our team has recently monitored and analysed a new stack of drive-by campaigns which aim to spread the Angler exploit kit by injecting malicious code into compromised web pages.

Because of the mechanisms involved and the attackers’ objectives, the campaign is prone to achieve large distribution and affect a big number of PCs and their users.

The campaign is carried out by installing a cocktail of malware on the compromised PC. The first payload consists of the notorious data thief Pony, which systematically harvests all usable usernames and passwords from the infected system and sends them to a series of Control & Command servers controlled by the attackers.

The purpose of this action is to abuse legitimate access credentials to web servers and CMS systems used by websites and to inject the malicious script in these websites so that the campaign achieves the largest possible distribution.

In the second phase, the drive-by campaigns unfolds via the victim being moved from the legitimate website, which has been compromised, to a heap of dedicated domains which drop the infamous Angler exploit kit.

The Angler exploit kit will then scan for vulnerabilities in popular third party software and in insecure Microsoft Windows processes, if the system hasn’t been updated. Once the security holes are identified, Angler will exploit them and force-feed CryptoWall 4.0 into the victim’s system.

(Excerpt) Read more at heimdalsecurity.com ...


TOPICS: Crime/Corruption; Extended News; Technical
KEYWORDS: computers; security; windowspinglist
FYI to technical FReepers, esp. those running corporate infrastructure. This is relatively isolated to Europe, but there are incidents of US targeting.
1 posted on 12/07/2015 4:46:21 AM PST by rarestia
[ Post Reply | Private Reply | View Replies]

To: rarestia; dayglored; Swordmaker

Ping to your lists


2 posted on 12/07/2015 4:46:46 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

Can we “retore” our systems to an earlier date to remove the “infection”? (I’m no computer whiz”)


3 posted on 12/07/2015 4:56:51 AM PST by DaveA37
[ Post Reply | Private Reply | To 2 | View Replies]

To: DaveA37

You shouldn’t rely on the capabilities of the operating system’s restore functionality. That goes for Apple’s time machine or Microsoft’s system restore. These infections are becoming more sophisticated and compromising the operating system AND associated backups if they’re online with the system.

If you’re doing regular offline backups, you can recover from those, but since most people don’t do this, it’s a problem.


4 posted on 12/07/2015 4:59:58 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: rarestia

I saw a laptop with 3.0 over the weekend. I didn’t have any of my stuff with me to analyze it further, but a preliminary read from the internet says they use real encryption so it will be hard to recover the files except maybe some fragments on disk.


5 posted on 12/07/2015 5:31:19 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
An FYI Ping for those of you who may be using a Virtual Machine Windows install on your Macs about a new malware threat to those Windows installs. -- PING!


Apple Virtual Machine Security
Malware Alert
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

6 posted on 12/07/2015 5:39:42 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Multi-stage attack to put CryptoWall ransomware on your Windows PC ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to rarestia for the ping!!

7 posted on 12/07/2015 5:42:46 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
> An FYI Ping for those of you who may be using a Virtual Machine Windows install on your Macs...

And don't forget those of us with Macs sporting BootCamp dual-boot Windows installations, too!

8 posted on 12/07/2015 5:45:10 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 6 | View Replies]

To: palmer

It’s sad, because from a Windows perspective, it’s actually very easy to prevent this. There are numerous Crypto prevention websites out there that will update your registry. Granted, the fixes will affect functionality of installs in some cases, but the AppData folder area used in Windows is fast becoming one of those bugaboos that Microsoft will eventually need to address.


9 posted on 12/07/2015 6:08:48 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rarestia

Does it make a website use funny characters instead of apostrophes?


10 posted on 12/07/2015 6:14:29 AM PST by Sawdring
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sawdring

LOL, no. That’s an encoding issue in the FR code.


11 posted on 12/07/2015 6:43:23 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: rarestia
The Angler exploit kit will then scan for vulnerabilities in popular third party software and in insecure Microsoft Windows processes, if the system hasn’t been updated. Once the security holes are identified, Angler will exploit them and force-feed CryptoWall 4.0 into the victim’s system.
So it is worth repeating:
keep your system updated and always install the latest updates available for the apps you use
This is the most important principle of all; more important even than running any kind of anti-virus software.
12 posted on 12/07/2015 7:14:20 AM PST by cartan
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

Thankfully, I deleted my windows partition last year. Forever.


13 posted on 12/07/2015 7:26:27 AM PST by aMorePerfectUnion
[ Post Reply | Private Reply | To 1 | View Replies]

To: cartan

And it’s important to reiterate: you are NOT SAFE ON XP! This is one of the many reasons to stop using XP.


14 posted on 12/07/2015 8:03:32 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: DaveA37

Yes, my company fought multiple attacks by cryptowall by restoring snapshots to network shares. Of course not everyone has that capability.


15 posted on 12/07/2015 11:36:15 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 3 | View Replies]

To: cartan
keep your system updated and always install the latest updates available for the apps you use

This is the most important principle of all; more important even than running any kind of anti-virus software.

While true, almost, but not quite... The primary operating principle here is to always get the data off the machine and out of the loop. It may be a PIA to reload the box, but it is doable - Data loss is forever.

Just ran into cryptowall with a client - Took her out. I have two automated chains of backup on her LAN... Didn't matter - by the time she realized her infection, both automated backups had run...

I also had a persistent reminder installed in her laptop (the machine she uses the most) to pester her to back up to a USB drive once a week - If she doesn't do it, my reminder will nag the crap out of her till she does. This really wasn't a real part of my backup design... She travels a lot, and her laptop is often away from the LAN, so this was more of a plan to make sure she backed up her critical data while she was away from home. It turned out to be that semi-manual backup that saved the day.

We were able to save her data from that USB drive, and her music and movies from the machine that runs her guest bedroom TV, which had not been running during the infection period... Her calendar, contacts, and mails were easy enough, sync'd to the web and her various devices...

In this time of massive data, it is really, really easy for IT tech to overlook the primary golden rule - get the data backed up off the system. OFF the system.

16 posted on 12/07/2015 2:01:14 PM PST by roamer_1 (Globalism is just Socialism in a business suit.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: roamer_1

Ouch! Good one. Do you have any idea how she got infected?


17 posted on 12/08/2015 2:50:46 AM PST by cartan
[ Post Reply | Private Reply | To 16 | View Replies]

To: cartan
Ouch! Good one. Do you have any idea how she got infected?

No, not really - I believe she caught it on her laptop, probably while she was in California, in the two days after her last USB backup - She lost the data for those two days, and everything thereafter... When she got home, her laptop knew it was home and ran it's automated backup, and sync'd to her desktop - I know the infection was present then because my client commented that the backup seemed to be shipping more data than normal - Evidently because the infection encryption changed the file date - and that overwrote everything local with her infected data (or maybe the other way around).

Another thing pointing to the laptop is that she lost corp access in California the last day she worked there - It wasn't resolved, because she was leaving too soon to resolve it, but the big iron refused her.

Never did get a notice out of Crypto - I suspect the bug was malformed and caused the malfunction that took the laptop out... But the infection was live in every machine that had been running on her local LAN, and the box on the living-room TV crapped out too, by the time I got out there... Whether and where were not my concern, but for everything to be carrying the bug means it traveled locally on the LAN shares.

It was really more luck than sense that I could restore her data - and this experience rattled me pretty badly - My long-standing theory on backup has been challenged by it, and found to be left wanting. How to better formulate backups to protect against this in the future has been on my mind for the past few weeks, and I still don't have a solution that gives me confidence.

And even after I find a better solution, implementation will be a nightmare. I serve SOHO and Residential... Not at all like a corporate environment where I have immediate control and distribution....

All of that is what prompted my message to you. : )

18 posted on 12/08/2015 12:22:26 PM PST by roamer_1 (Globalism is just Socialism in a business suit.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: roamer_1

Wow, that sounds bad. Nasty worm. Thanks for the explanation!


19 posted on 12/08/2015 1:21:08 PM PST by cartan
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson