Popular Posts
-
by Chris Burt on Thursday, October 6 2016 As the October 10 deadline approaches for non-binding offers for Host Europe Grou...
-
Managed WordPress hosting provider Pagely is celebrating its 7th birthday, according to an extensive blog post on its history, which goes ...
-
Deutsche Telekom and United Internet are preparing rival bids for German web hosting provider Host Europe Group (HEG) ahead of an Oct. 10 ...
-
Online security is one of the biggest challenges in this hacker heavy digital arena. Security is the first parameter you should reinforc...
-
The first season of Westworld ended with one heck of a finale. Alongside the death of Anthony Hopkins' character, the Hosts rose up ...
-
(PRLEAP.COM) October 12, 2015 - SeekDotNet.com is a leading ASP.NET and Windows hosting provider from United States who provides a var...
-
PUNE, India , Aug.� Market Research Future published a half cooked research report on "Global Web Hosting Services Market Research Re...
-
Even if your business sells a unique product or service and manages to attract scores of website visitors through clever marketing campaig...
-
Embrace the Madness! It's that time of year again at HostBaby – we're stirring the cauldron, cackling maniacally, and in the mood...
-
The Golden Globes were a strong night for "La La Land" and FX's "Atlanta," but first-time host Jim...
Blog Archive
- December (19)
- November (25)
- October (28)
- September (26)
- August (28)
- July (31)
- June (26)
- May (27)
- April (28)
- March (30)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (29)
- August (44)
- July (56)
- June (53)
- May (54)
- April (48)
- March (55)
- February (44)
- January (3)
- December (5)
- November (5)
- October (26)
- September (25)
- August (29)
- July (26)
- June (18)
- September (1)
About Me
Total Pageviews
Server hosting Cerber ransomware shut down
FireEye found all of the hallmarks researchers have seen from other types of ransomware: phishing attempts, macros and customer service.
A command-and-control server that has been used to distribute a ransomware campaign has been shut down by a combination of security researchers from FireEye, the Computer Emergency Response Team in the Netherlands and several web hosting companies.
In a blog post written by two FireEye researchers, the company details how the Cerber ransomware variant works its way into Windows-based machines using fairly common methods. A malicious payload has been attached to a Word document, which has then been attached to a faulty email. Once the Word document is opened, a macro then writes a small piece of VBScript into memory, starting the process to encrypt a user's files.
Researchers also found that like many other ransomware variants, there is an element of customer service built into the malware. The decryptor supports 12 languages to facilitate payment. Additionally, the criminals offer victims a discount if the ransom is paid within a certain time frame.
The blog post's authors also found the attackers monitored a number of countries in Eastern Europe and Central Asia — including Russia, Ukraine and Moldova among others — to keep the ransomware outside of certain legal jurisdictions.
[Read more: Feds confident in fight against ransomware]
"Selective targeting has historically been used to keep malware from infecting endpoints within the author's geographical region, thus protecting them from the wrath of local authorities," the blog post reads. "The actor also controls their exposure using this technique. In this case, there is reason to suspect the attackers are based in Russia or the surrounding region."
The server shutdown comes as Cerber has been spotted causing problems for cloud-based services. Last week, Trend Micro found a variant of Cerber was targeting individual and business Office 365 accounts.
Ransomware, particularly through macro-based attacks, has picked up in recent months. In the first quarter of 2016, there were 450,000 cases of macro malware, according to a McAfee Labs report — up about 300,000 cases from the same time in 2014.
[Want more stories like this? Sign up for the CyberScoop newsletter, and allow us to make sense of it all.]
The FireEye team strongly suggested turning off macros to prevent any further problems.
"Disabling support for macros in documents from the Internet and increasing user awareness are two ways to reduce the likelihood of infection," the blog post reads. "If you can, consider blocking connections to websites you haven't explicitly whitelisted. However, these controls may not be sufficient to prevent all infections or they may not be possible based on your organization."
Contact the reporter on this story via email at greg.otto@fedscoop.com, or follow him on Twitter at @gregotto. His OTR and PGP info can be found here. Subscribe to the Daily Scoop for stories like this in your inbox every morning by signing up here: fdscp.com/sign-me-on.
Source: Server hosting Cerber ransomware shut down
0 comments:
Post a Comment