London uni fears 0-day used to cram network with ransomware

Discussion in 'malware problems & news' started by Minimalist, Jun 14, 2017.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://www.theregister.co.uk/2017/06/14/university_college_london_ransomware_attack/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Question is why are they opening attachments in the first place?
     
  3. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,879
    Human curiosity. Malware authors know the biggest flaw they can exploit is human nature.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://threatpost.com/ransomware-attack-hobbles-prestigious-university-college-london
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  6. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    '"Currently it appears the initial attack was through a phishing email, although this needs to be confirmed," the ISD said.' ~ op cit
     
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
     
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Oh yes folks, you can get ransomware via a drive-by download.

    A few months back, Eset detected same. I am posting the screen shots below. At first, I thought it was a FP because no one at VT detected anything about the URL. This went for a couple of days - no detections. Also, each drive-by download had a different hash indicating it was polymorphic. So I finally manually submitted the URL to Quttera. It found plenty of malware. Also after that scan, it finally showed detections at VT - thank you, itman.

    Anyway, this incident made me a "firm believer" in Eset's ransomware detection capability. BTW - the ransomware was Cerber.

    Eset_Malware_Cerber_2.png


    Eset_Malware_Quttera.png
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Well it's a website where exploits and vulnerabilities are discussed so there could be some links to POCs and malware posted... Using IE to access that site would not be my choice ;)
     
  10. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    I don't know which is the most disconcerting, a phishing email or a drive-by web page. :eek:
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://www.infosecurity-magazine.com/news/ulster-university-also-suffered/
     
  12. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  13. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    This incident might get interesting ..............
    http://www.securityweek.com/uk-center-security-excellence-hit-ransomware
     
  14. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    LOL, good one. But if they were really hacked via web-exploit, I wonder which browser they were using. It would be crazy to still use IE.
     
  15. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Looks like most Wilders folks are covered on this one; the ad blocker part that is.
    https://www.scmagazine.com/ad-blockers-help-prevent-ransomware-says-graham-cluley/article/670877/

    Also a classic example of a drive-by download. Hum ....... isn't SmartScreen supposed to prevent stuff like this?
     
    Last edited: Jun 23, 2017
  16. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    So they probably used some not up-to-date software that got exploited? I wonder which one was that.
    Unfortunately, ad blockers are a must and I usually install them right after I install browser.
     
  17. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I read about it, they used an unpatched version of IE, that's asking for trouble. Apparently their AV also failed to block it. All they need to do is start using FF or Chrome with ad-blocker, and of course AE/white-listing.
     
  18. guest

    guest Guest

    :thumb:
    An adblocker is also my first extension after i have installed a browser.
     
  19. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Link please.
     
  20. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Adgholas malvertising group linked to UCL Trojan ransomware attack
    https://www.scmagazineuk.com/adghol...-ucl-trojan-ransomware-attack/article/670252/
     
  21. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    WoW ! This is getting sirius. Thanks for that one @itman.

    I pity those who do not read Wilders daily. It's easy to lose sight of the fact that the vast majority have no idea of the online threats they face daily and their total lack of awareness of the deficiencies in their security practices.
     
  22. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://www.proofpoint.com/us/threa...paign-using-astrum-ek-deliver-mole-ransomware

    -EDIT-

    CVE-2016-0189 is an IE8-11 vulnerability posted 5/2016
    CVE-2016-1019 and 4117 are Flash Player vulnerabilities

    My money is on the use of a new undisclosed vulnerability in these latest attacks.
     
    Last edited: Jun 25, 2017
  23. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Thinking that Microsoft should make uBlock Origin an integrated part of Windows. WD and Smite Screen are apparently not enough.

    Does Smite Screen disable uBlock also?? Why not? Since it disables KIS it's only fair that it should also disable uBlock. Looks like a clear case of discriminatory behavior. uBlock should sue Microsoft for not being blocked by Windows.
     
  24. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    And you already know the worse part. Most couldn't care less but only to get online and take off blindly like a bat not even realizing they been owned several times over or when their system goes Kap00f or overheats due to the nature of some of them. Burn baby burn is the motto for advert foulware makers. Drive new unit sales up or tech support right?
     
  25. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Yeah, I hear you. Kids these days.

    BTW: Looking at your Signature, are you sure you couldn't use a little "beefing-up" yourself in your security set up :) Maybe an M1A2 Abrams Tank or something like that.
     
    Last edited: Jun 24, 2017
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.