Attacks/Breaches

12/2/2015
12:15 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

CryptoWall 4.0 Spreading Via Angler Drive-By Download Campaign

Sweet-talking ransomware making rounds in attacks originating from Ukraine-based hosts.

CryptoWall 4.0, the newest version of the CryptoWall ransomware, is being packed into the Angler exploit kit and spreading through a new drive-by download campaign, according to researchers at Heimdal Security

Heimdal first discovered CryptoWall 4.0 in the wild just one month ago. It's stealthier than earlier versions of the ransomware -- it encrypts not just files, but filenames too.

It also uses a strikingly different ransom message. Instead of demanding payment and trying to frighten the user, the new variant tries to convince a user to buy a $700 "software package" and delivers veiled threats within a message that begins "Congratulations! You have become a part of large community CryptoWall!" 

The new attack campaign uses what Heimdal calls a "stack of drive-by campaigns," that hit the victim with multiple payloads, including the Pony information stealer, the Angler exploit kit, and ultimately, CryptoWall. 

The victim is first hit the the Pony information stealer, which scrapes all the usernames and passwords it can find off the victim's system and sends them back to the attackers command-and-control server. Heimdal researchers state that the purpose is to find credentials for Web servers or content management systems and use them to inject malicious scripts into new sites, thus further broadening the attack campaign.

The victim is then redirected to another site that drops Angler, which scans the system for vulnerabilities and feeds it CryptoWall 4.0.

Heimdal has found over 200 new domains being used by attackers in the past 24 hours alone. The campaign originates from a hosting environment in the Ukraine, and has thusfar hit websites in Denmark particularly hard -- over 100 sites there have been injected with malware.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11378
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2019-11372
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11373
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11374
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
CVE-2019-11375
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.