Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
CryptoWall Makes a Comeback via Malicious Help Files
Newest First  |  Oldest First  |  Threaded View
XIANLEE78
50%
50%
XIANLEE78,
User Rank: Apprentice
6/4/2015 | 12:57:35 PM
Re: Network Drives
I know it can traverse mapped drives, but can it hit the "favorites" from explorer as well? If not we could GPO favorites instead of mapped drives. Thoughts?
anon4559049434
50%
50%
anon4559049434,
User Rank: Author
3/10/2015 | 9:18:51 AM
Re: Network Drives
Hi Ryan,

Network attached storage can also fall victim to ransomware. As long as the user has read/write access to these locations, the crypto-ransomware can iterate through the files on the mounted drives, look for relevant target files, encrypt and overwrite them. From a technical perspective, this approach is no different than writing and deleting files on or from network shares. It's worth mentioning that crypto-ransomware does not use worm-like exploit techiques to jump from one host to another, it just makes use of the functionalities and permissions that are available to the user.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/9/2015 | 10:49:39 PM
Outdated and too insecure?
Like Flash, I'm beginning to wonder if it's time to put JavaScript out to pasture for being so ridiculously unsecure.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
3/9/2015 | 3:26:56 PM
Network Drives
Backups are always smart when it comes to data safety. I normally recommend network drives and frequent backups, however the frequent backups may increase in difficulty the larger the data store is.

My question towards cryptowall and other ransomware is can it encrypt network drives? IE can it traverse the connection from the client to the hardware behind the network drive and encrypt those files? If so, how is this accomplished?


News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21427
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in v...
CVE-2021-21426
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework ...
CVE-2020-36324
PUBLISHED: 2021-04-21
Wikimedia Quarry analytics-quarry-web before 2020-12-15 allows Reflected XSS because app.py does not explicitly set the application/json content type.
CVE-2020-28973
PUBLISHED: 2021-04-21
The ABUS Secvest wireless alarm system FUAA50000 (v3.01.17) fails to properly authenticate some requests to its built-in HTTPS interface. Someone can use this vulnerability to obtain sensitive information from the system, such as usernames and passwords. This information can then be used to reconfig...
CVE-2021-29456
PUBLISHED: 2021-04-21
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any...