• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Darkleech campaign targets Java to spread Reveton ransomware

New threat also focuses on Adobe vulnerabilities, warns FireEye

Security padlock image
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 17 September 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

The Darkleech campaign responsible for compromising thousands of websites has resurfaced, targeting Java and Adobe vulnerabilities to spread the Reveton ransomware.

Security firm FireEye reported being alerted to the latest wave of Darkleech attacks in a public blog post after its own web url was being targeted. "We were notified by several security researchers that a fireeye[.]com/careers HR link was inadvertently serving up a drive-by download exploit," read the post.

"It turns out, this attack was not targeted and it was not a watering hole attack. Instead, this campaign appears to be a recent wave of the Darkleech malware campaign, where third-party Horde/IMP Plesk Webmail servers were vulnerable to attack and used to serve up Java exploits that ultimately drop yet another ransomware named Reveton (similar to Urausy)."

Malware research engineer at FireEye Josh Gomez told V3 the attack is a development on the traditional Darkleech operation, and uses a multi-stage process to redirect users to malware-ridden websites.

"Darkleech itself is mainly responsible for getting you to the page that does the actual exploitation. Think of it as a crook who jumps out of some dark alley as you are trying to walk to the store. You are minding your own business when he pops out and says, ‘Hey, come here, go this way, this is the way to the store.' Next thing you know, you follow his lead and end up getting robbed and assaulted by masked men in that alley," he said.

"The next stage is where the actual attack takes place, systems become exploited and subsequently infected. The URL that Darkleech tries to get the victim to load is typically that of a site hosting the Blackhole Exploit Kit. The Blackhole Exploit Kit is a professional framework for automatically exploiting weaknesses in vulnerable browsers, as well as vulnerable versions of Java and Adobe software, such as Adobe Reader."

Gomez said the new attack will likely be a headache for businesses, as the criminals' infection method can circumvent many traditional cyber defences and can be used to spread a multitude of other malware when combined with tools such as the Blackhole Exploit Kit. "This type of attack can affect users and business by subverting perimeter security defences and allowing dangerous malware to enter the enterprise," he said.

"In the case of Darkleech plus Blackhole campaigns, we primarily see click-fraud Trojans (ZeroAccess), downloaders (that download other malware, such as Pony), credential-stealing banking Trojans (Zbot/Zeus) and ransomware-style malware where a user's computer can be locked and held hostage until a ‘ransom' is paid to unlock it."

The FireEye researcher said businesses should to be extra vigilant with their update cycles and reassess whether they need to run Java.

"To defend against this sort of attack, enterprises and users should maintain up-to-date versions of web browsers as well as Java and Adobe reader versions. If Java is not needed, it can be disabled to mitigate Java-based attacks. Also, having up-to-date perimeter security solutions as well as host antivirus and intrusion prevention systems on the endpoint itself can help prevent falling victim," he said.

Darkleech is a malicious module designed to target Apache (web) servers. It is already believed to have turned thousands of websites hosted on Apache into malware-spreading tools. Worse still, the tool is known to be available on numerous cyber black markets for as little as $1,000.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Hacking
  • cyber-crime
  • malware
  • Apache

V3 Latest

Microsoft Windows 10 on a laptop
How to fix the Windows 10 Anniversary Update

Tips to get your PC back in order if the Anniversary Update has created problems

  • Operating Systems
  • 11 August 2016
Android logo
Google fined £5.2m for Android antitrust violations in Russia

Firm has also been ordered to change its agreements with device makers

  • Law
  • 11 August 2016
brexit-shutterstock-417868516
Brexit: Tech sector loses confidence in UK after Leave vote

Survey of techUK members finds despondency among cutting-edge firms

  • Government
  • 11 August 2016
Galaxy Note 5 vs Galaxy Note 7
Galaxy Note 7 vs Galaxy Note 5

How does the new Galaxy Note compare with its predecessor?

  • Mobile Phones
  • 11 August 2016
blog comments powered by Disqus
Back to Top

Most read

Apple acquires Coherent Navigation to bolster Apple Maps
Apple execs admit 'embarrassment' over Maps debacle
Microsoft Windows 10 on a laptop
How to fix the Windows 10 Anniversary Update
credit-card
Oracle hack potentially compromises almost every US credit card
Microsoft Windows XP boxes on the assembly line in 2001
Windows XP: 7 reasons ancient OS refuses to die
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016