Results 1 to 8 of 8
  1. #1
    Dislocated Member
    Neo's Avatar
    Join Date
    May 2011
    Last Online
    31-10-2021 @ 03:34 AM
    Location
    Nebuchadnezzar
    Posts
    10,609

    Certified Ethical Hacker website caught spreading crypto ransomware

    Major security certification group ignored private warnings for more than 3 days.



    For the past four days, including during the hour that this post was being prepared on Thursday morning, a major security certification organization has been spreading TeslaCrypt malware—despite repeated warnings from outside researchers.

    EC-Council, the Albuquerque, New Mexico-based professional organization that administers the Certified Ethical Hacker program, started spreading the scourge on Monday. Shortly afterward, researchers from security firm Fox IT notified EC-Council officials that one of their subdomains—which just happens to provide online training for computer security students—had come under the spell of Angler, a toolkit sold online that provides powerful Web drive-by exploits. On Thursday, after receiving no reply and still detecting that the site was infected, Fox IT published this blog post, apparently under the reasonable belief that when attempts to privately inform the company fail, it's reasonable to go public.

    Like so many drive-by attack campaigns, the one hitting the EC-Council is designed to be vexingly hard for researchers to replicate. It targets only visitors using Internet Explorer and then only when they come to the site from Google, Bing, or another search engine. Even when these conditions are met, people from certain IP addresses—say those in certain geographic locales—are also spared. The EC-Council pages of those who aren't spared then receive embedded code that redirects the browser to a chain of malicious domains that host the Angler exploits.

    The Fox IT blog post continued:

    Through this embedding the client is redirected a couple of times to avoid/frustrate/stop manual analysis and some automated systems. Once the user has jumped through all the redirects he/she ends up on the Angler exploit kit landing page from which the browser, flashplayer plugin or silverlight plugin will be exploited. The Angler exploit kit first starts the ‘Bedep’ loader on an exploited victim machine which will download the final payload.

    The way the redirect occurs on the EC-COUNCIL website is through PHP code on the webserver which is injecting the redirect into the webpage. A vulnerability in the EC-COUNCIL website is most likely exploited as it runs the very popular WordPress CMS which has been a target through vulnerable plug-ins for years.

    Payload details: TeslaCrypt

    This specific campaign instance of the Angler exploit kit drops ‘TeslaCrypt’ on the exploited victim’s machine. TeslaCrypt is a piece of ransomware which takes a victim’s files hostage with the use of encryption. Once the victim’s files have been successfully encrypted a ransom note is presented to instruct the victim on ways to recover files:



    TeslaCrypt requires the victim to pay around 1.5 BTC to get their files back; this equals to approximately 622$ at the current conversion rate.

    The EC-Council infection comes eight days after The New York Times, the BBC, and other big-name Web publishers fell victim to a rash of malicious ads that attempted to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors. Last week's campaign was unusual for hitting so many different ad networks all at once. So far, none of the compromised networks—including those run by Google, AppNexis, AOL, and Rubicon—have provided statements explaining how the mass compromise happened or what they've done to ensure that similar attacks won't succeed again.

    This post originated on Ars Technica
    Life should not be a journey to the grave with the intention of arriving safely in a pretty and well preserved body, but rather to skid in broadside in a cloud of smoke, thoroughly used up, totally worn out, and loudly proclaiming "Wow! What a Ride!"

  2. #2
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    97,733
    Certified Ethical Fuckwit more like.

    What a bunch of arseholes!


  3. #3
    euston has flown

    Join Date
    Jun 2009
    Last Online
    10-06-2016 @ 03:12 AM
    Posts
    6,978
    Ive often told clients that the most important thing to do regarding security breaches is to meet the expectations of professionalism that your customers expect.

    for a security company that sells training and certification which is only as valuable to their customers as eu-councel own reputation for knowing what they are unto.....

    I would say their behaviour is catastrophic, I have to wonder is they are going to get hit by a class action from of the people who spent money on these certifications only to have them devalued by this fuckwittery.
    Teakdoor CSI, TD's best post-reality thinkers

    featuring Prattmaster ENT, Prattmaster Dapper and PrattmasterPseudolus

    Dedicated to uncovering irrational explanations to every event and heroically
    defending them against the onslaught of physics, rational logic and evidence

  4. #4
    Thailand Expat
    Join Date
    Mar 2015
    Last Online
    @
    Posts
    2,332
    Quote Originally Posted by hazz
    Ive often told clients that the most important thing to do regarding security breaches is to meet the expectations of professionalism that your customers
    And does that help you to sell more cheeseburgers?

  5. #5
    euston has flown

    Join Date
    Jun 2009
    Last Online
    10-06-2016 @ 03:12 AM
    Posts
    6,978
    no idea really, did work with 3663 for a while and they did sell cheese and burgers... though I do believe that after 15 years they worked out that 3663 was a wank name for a company.... so wank it makes me wonder if you worked for them back in the 90's

  6. #6
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    97,733
    I don't take any of these certifications seriously. They're mostly multiple choice exams that people swot for, and in general they know fuck all about what is going on underneath.

  7. #7
    Excommunicated baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 06:38 PM
    Posts
    24,864
    what sort of person uses internet exploder unless it is forced upon them at work ?

  8. #8
    euston has flown

    Join Date
    Jun 2009
    Last Online
    10-06-2016 @ 03:12 AM
    Posts
    6,978
    ^^ Personally I like to see people who are keeping their training up to date. I would see a certification as evidence that the person knows what they would have been taught on the paired up training courses.

    And some of them are quite well thought out and geninly useful whilst others are just testing that you have parrot lernt the marketing departments bollocks off by heart..

    ^forced by work, that work place with lots of valubale files to encript, the company with the pockets so deep they will pay up without a second thought because its cheaper than trying to restore the files..... sounds like these bad boys know their market well

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •