Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/22/2016
12:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now

A zero-day exploit exposed in the Hacking Team breach is among the top weapons deployed in recent ransomware attacks, as well as lots of Flash.

Don’t blink, but there’s a common thread in the most recent ransomware attacks: they use four known Adobe Flash Player and Microsoft Silverlight software bugs that have patches available, according to new research published today.

So if you haven’t already patched recently revealed Flash flaws CVE-2015-7645, CVE-2015-8446, CVE-2015-8651, and Microsoft Silverlight’s CVE-2016-0034, you’ll “significantly” minimize your risk of getting hit by the latest in ransomware threats if you apply these updates, according to Recorded Future, which analyzed which vulns were being exploited most in ransomware attacks as of March 16.

Scott Donnelly, a director at Recorded Future, says he launched the study after talking with a friend at a local Blue Cross/Blue Shield location about worries of the potential threat of a ransomware attack. The organization relies on a vendor for its software-patching, so that made Donnelly wonder which vulnerabilities are being used most by popular exploit kits in ransomware attacks.

“There are multiple ways to get hit by ransomware. We looked at some of the recent vulnerabilities with exploits ... for patch prioritization” planning, Donnelly says.

Recorded Future says its analysis suggests that recent highly publicized attacks on hospitals and police departments in North American and Europe were most likely not targeted attacks: instead, the bad guys had cast a wide net and those poorly patched systems landed right in it.

“We’re now at the point where you can get crippled in same way as with targeted attack [as you can] by an untargeted one,” Donnelly says. “A hospital worker using an EMR [electronic medical record]... Googles a patient’s condition and gets ransomware,” for example.

The Angler, Neutrino, Magnitude, RIG, and Nuclear exploit kits spread the Flash CVE 2015-7645 exploit; Angler spreads Flash 2015-8446; Angler and Neutrino spread Flash CVE 2015-8651; and Angler spreads Silverlight CVE-2016-0034, an exploit exposed in the Hacking Team breach.

In addition to patching these four vulns, Recorded Future offers additional recommendations for thwarting ransomware attacks: set Flash to “click to play;” run browser ad-blockers to protect against malvertising-borne attacks; and perform regular backups, especially of shared files, which are often the target of ransomware attacks.

“If you don’t make the decision to keep backups offline when you’re hit, you have a binary decision: either pay the ransom or lose the data,” says Levi Gundert, director of intelligence strategies at Recorded Future.

Meanwhile, ransomware victim counts are likely more widespread than is publicly known. “So many companies don’t publicize that they’ve been hit” by ransomware, Donnelly says.

Related Content:

Interop 2016 Las VegasFind out more about ransomware at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
3/23/2016 | 12:01:51 PM
Down with Flash
InfoSec professionals agree, and its time industry acted.  Flash should be gone.  It should be banned.  It should be expunged.  (For goodness sakes, we have HTML5 now!)  There is no excuse anymore.

(Or, as The Register once put it: Flash apologists are "the antivaxxers of the Internet".)
DarwinC123
50%
50%
DarwinC123,
User Rank: Strategist
3/24/2016 | 12:31:18 PM
Re: Down with Flash
I totally agree with your post. I presently have flash since it is required with the kronos timekeeping workforce application. It also requires Java. ; (
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/24/2016 | 7:58:17 PM
Re: Down with Flash
"It also requires Java."

Wow.  Double-whammy.  :/

Java has been found to have more vulnerabilities than Flash, actually -- but, on the whole, they lack the severity of Flash vulnerabilities.
komeara26
50%
50%
komeara26,
User Rank: Apprentice
3/24/2016 | 9:19:34 PM
Exploit Kits and CVE-2015-8651
Just a litle information to add....CVE-2015-8651 has also been packaged in Nuclear Pack Exploit Kit and Magnitude Exploit Kit.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Healthcare Industry Sees Respite From Attacks in First Half of 2020
Robert Lemos, Contributing Writer,  8/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: It's a technique known as breaking out of the sandbox kids.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20383
PUBLISHED: 2020-08-13
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.
CVE-2020-24348
PUBLISHED: 2020-08-13
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
CVE-2020-24349
PUBLISHED: 2020-08-13
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.
CVE-2020-7360
PUBLISHED: 2020-08-13
An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was r...
CVE-2020-24342
PUBLISHED: 2020-08-13
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.