Popular Posts
-
We can offer a wide variety of hosting options such as Amazon Web Services, Microsoft's Azure, Nexcess, WPengine, Liquid Web, Panthe...
-
Donald J. Trump has entered presidential politics like a force of nature, thrilling some, horrifying others, and contributing to a nominat...
-
/EINPresswire.com/ -- SANTA FE, NM--(Marketwired - October 15, 2016) - CrowdReviews.com, an online platform for B2B service reviews, urges...
-
ASPHostPortal.com - the leader of ASP.NET hosting provider launches Entity Framework 7 hosting with Fast Speed, Excellent Service, and C...
-
HostForLIFE.eu, a leading web hosting provider, has leveraged its gold partner status with Microsoft to launch its latest Umbraco 7.3.0 ...
-
The costs of setting up and maintaining a website can add up quickly and it is not an easy task to make the choices at the start and sta...
-
Published Thursday, Jul. 28, 2016, 7:16 pm Front Page » Podcasts, Etc. » Video: Two new episodes of God and Country Music web TV ser...
-
1011 8 hours ago from Steve Orchosky, UI/UX Web Designer Hey all! I was wondering what everyone uses to host your websites (...
-
And while mostly giving Google a pat on the back with this announcement, I felt like it stopped just short of a resounding end...
-
Introduction I am writing this article as a result of my learning for deploying ASP.NET Core web applications on Linux boxes. There is a ...
Blog Archive
- December (19)
- November (25)
- October (28)
- September (26)
- August (28)
- July (31)
- June (26)
- May (27)
- April (28)
- March (30)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (29)
- August (44)
- July (56)
- June (53)
- May (54)
- April (48)
- March (55)
- February (44)
- January (3)
- December (5)
- November (5)
- October (26)
- September (25)
- August (29)
- July (26)
- June (18)
- September (1)
About Me
Total Pageviews
Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back
According to a blog post published by NAYANA, the web hosting company, this unfortunate event happened on 10th June when ransomware malware hit its hosting servers and attacker demanded 550 bitcoins (over $1.6 million) to unlock the encrypted files.
However, the company later negotiated with the cyber criminals and agreed to pay 397.6 bitcoins (around $1.01 million) in three installments to get their files decrypted. The hosting company has already paid two installments at the time of writing and would pay the last installment of ransom after recovering data from two-third of its infected servers.
According to the security firm Trend Micro, the ransomware used in the attack was Erebus that was first spotted in September last year and was seen in February this yea r with Windows' User Account Control bypass capabilities.
Since the hosting servers were running on Linux kernel 2.6.24.2, researchers believe that Erebus Linux ransomware might have used known vulnerabilities, like DIRTY COW; or a local Linux exploits to take over the root access of the system. "The version of Apache NAYANA used is run as a user of nobody(uid=99), which indicates that a local exploit may have also been used in the attack," researchers note. "Additionally, NAYANA's website uses Apache version 1.3.36 and PHP version 5.1.4, both of which were released back in 2006." Erebus, the ransomware primarily targeting users in South Korea, encrypts office documents, databases, archives, and multimedia files using the RSA-2048 algorithm and then appends them with a .ecrypt extension before displaying the ransom note."The file is first scrambled with RC4 encryption in 500kB blocks with randomly generated keys," researchers say. "The RC4 key is then encoded with AES encryption algorithm, which is stored in the file. The AES key is again encrypted using RSA-2018 algorithm that is also stored in the file."The public key which is generated locally is shared, while the private key is encrypted using AES encryption and another randomly generated key.
According to analysis conducted by the Trend Micro researchers, decryption of infected files is not possible without getting hold of the RSA keys.
So, the only safe way of dealing with ransomware attacks is prevention. As we have previously recommended, the best defense against Ransomware is to create awareness within the organizations, as well as to maintain back-ups that are rotated regularly.
Most viruses are introduced by opening infected attachments or clicking on links to malware usually in spam emails. So, DO NOT CLICK on links provided in emails and attachments from unknown sources.
Moreover, ensure that your systems are running the latest version of installed applications.
Source: Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back
0 comments:
Post a Comment