Posts tagged ‘bitdefender’ Linux Ransomware Debut Fails on Predictable Encryption Key (Bitdefender Labs)

This post was syndicated from: and was written by: ris. Original post: at

Bitdefender Labs takes
a look
at Linux.Encoder.1 ransomware. “Linux.Encoder.1 is
executed on the victim’s Linux box after remote attackers leverage a flaw
in the popular Magento content management system app. Once executed, the
Trojan looks for the /home, /root and /var/lib/mysql folders and starts
encrypting their contents. Just like Windows-based ransomware, it encrypts
the contents of these files using AES (a symmetric key encryption
algorithm), which provides enough strength and speed while keeping system
resources usage to a minimum. The symmetric key is then encrypted with an
asymmetric encryption algorithm (RSA) and is prepended to the file, along
with the initialization vector used by AES.
” Once the files are
encrypted the hackers demand a fee in exchange for the RSA private key to
decrypt the AES symmetric one. However, Bitdefender researchers were able
to recover the AES key without having to decrypt it with the RSA private
key. One can also thwart this threat with some good backups. (Thanks to Richard Moore)

Krebs on Security: Ransomware Now Gunning for Your Web Sites

This post was syndicated from: Krebs on Security and was written by: BrianKrebs. Original post: at Krebs on Security

One of the more common and destructive computer crimes to emerge over the past few years involves ransomware — malicious code that quietly scrambles all of the infected user’s documents and files with very strong encryption.  A ransom, to be paid in Bitcon, is demanded in exchange for a key to unlock the files. Well, now it appears fraudsters are developing ransomware that does the same but for Web sites — essentially holding the site’s files, pages and images for ransom.

Image: Kaspersky Lab

Image: Kaspersky Lab

This latest criminal innovation, innocuously dubbed “Linux.Encoder.1” by Russian antivirus and security firm Dr.Web, targets sites powered by the Linux operating system. The file currently has almost zero detection when scrutinized by antivirus products at Google’s, a free tool for scanning suspicious files against dozens of popular antivirus products.

Typically, the malware is injected into Web sites via known vulnerabilities in site plugins or third-party software — such shopping cart programs. Once on a host machine, the malware will encrypt all of the files in the “home” directories on the system, as well backup directories and most of the system folders typically associated with Web site files, images, pages, code libraries and scripts.

The ransomware problem is costly, hugely disruptive, and growing. In June, the FBI said said it received 992 CryptoWall-related complaints in the preceding year, with losses totaling more than $18 million. And that’s just from those victims who reported the crimes to the U.S. government; a huge percentage of cybercrimes never get reported at all.


On Nov. 4, the Linux Website ramsomware infected a server used professional Web site designer Daniel Macadar. The ransom message was inside a plain text file called “instructions to decrypt” that was included in every file directory with encrypted files:

“To obtain the private key and php script for this computer, which will automatically decrypt files, you need to pay 1 bitcoin(s) (~420 USD),” the warning read. “Without this key, you will never be able to get your original files back.”

Macadar said the malware struck a development Web server of his that also hosted Web sites for a couple of longtime friends. Macadar was behind on backing up the site and the server, and the attack had rendered those sites unusable. He said he had little choice but to pay the ransom. But it took him some time before he was able to figure out how to open and fund a Bitcoin account.

“I didn’t have any Bitcoins at that point, and I was never planning to do anything with Bitcoin in my life,” he said.

According to Macadar, the instructions worked as described, and about three hours later his server was fully decrypted. However, not everything worked the way it should have.

“There’s a  decryption script that puts the data back, but somehow it ate some characters in a few files, adding like a comma or an extra space or something to the files,” he said.

Macadar said he hired Thomas Raef — 0wner of Web site security service — to help secure his server after the attack, and to figure out how the attackers got in. Raef told me his customer’s site was infected via an unpatched vulnerability in Magento, a shopping cart software that many Web sites use to handle ecommerce payments.

CheckPoint detailed this vulnerability back in April 2015 and Magento issued a fix yet many smaller ecommerce sites fall behind on critical updates for third-party applications like shopping cart software. Also, there are likely other exploits published recently that can expose a Linux host and any associated Web services to attackers and to site-based ransomware.


This new Linux Encoder malware is just one of several recent innovations in ransomware. As described by Romanian security firm Bitdefender, the latest version of the CryptoWall crimeware package (yes, it is actually named CryptoWall 4.0) displays a redesigned ransom message that also now encrypts the names of files along with each file’s data! Each encrypted file has a name made up of random numbers and letters.

Traditional ransomware attacks also are getting more expensive, at least for new threats that currently are focusing on European (not American) banks. According to security education firm KnowBe4, a new ransomware attack targeting Windows computers starts as a “normal” ransomware infection, encrypting both local and network files and throwing up a ransom note for 2.5 Bitcoin (currently almost USD $1,000). Here’s the kicker: In the ransom note that pops up on the victim’s screen, the attackers claim that if they are not paid, they will publish the files on the Internet.



Well,  that’s one way of getting your files back. This is the reality that dawns on countless people for the first time each day: Fail to securely back up your files — whether on your computer or Web site — and the bad guys may eventually back them up for you! ‘

Oh, the backup won’t be secure, and you probably won’t be able to remove the information from the Internet if they follow through with such threats.

The tools for securely backing up computers, Web sites, data, and even entire hard drives have never been more affordable and ubiquitous. So there is zero excuse for not developing and sticking with a good backup strategy, whether you’re a home user or a Web site administrator.

PC World last year published a decent guide for Windows users who wish to take advantage of the the OS’s built-in backup capabilities. I’ve personally used Acronis and Macrium products, and find both do a good job making it easy to back up your rig. The main thing is to get into a habit of doing regular backups.

There are good guides all over the Internet showing users how to securely back up Linux systems (here’s one). Others tutorials are more OS-specific. For example, here’s a sensible backup approach for Debian servers. I’d like to hear from readers about their backup strategies — what works — particularly from those who maintain Linux-based Web servers like Apache and Nginx.

It’s worth noting that the malware requires the compromised user account on the Linux system to be an administrator; operating Web servers and Web services as administrator is generally considered poor security form, and threats like this one just reinforce why.

Also, most ransomware will search for other network or file shares that are attached or networked to the infected machine. If it can access those files, it will attempt to encrypt them as well. It’s a good idea to either leave your backup medium disconnected from the system unless and until you are backing up or restoring files.

For his part, Macadar said he is rebuilding the compromised server and now backing up his server in two places at once — using local, on-site backup drives as well as remote (web-based) backup services.

TorrentFreak: Bitdefender Blocks Anti-Piracy Website as Malware

This post was syndicated from: TorrentFreak and was written by: Ernesto. Original post: at TorrentFreak

rightscorp-realPiracy monetization firm Rightscorp has made several headlines recently, often because of its aggressive attempts to obtain settlements from allegedly pirating Internet users.

The publicly traded company ask U.S. ISPs to forward DMCA notices to subscribers, with a settlement offer tagged on to the end.

On behalf of Warner Bros, BMG and other copyright holders Rightscorp asks subscribers to pay $30 per pirated file, or risk a potential $150,000 ‘fine’ in court.

Increasingly, these practices have resulted in a backlash. Rightscorp was sued for fraud, harassment and abuse late last year and just last month Internet provider Cox Communications described its settlement emails as “improper extortion threats

Today we can add another setback to this list. For the past few days prominent anti-virus vendor Bitdefender has been blocking the company’s website after categorizing it as malware.

People who receive a notice from Rightcorp are welcomed with the following popover when they try to access the settlement page. The notice is limited to the settlement pages and doesn’t appear on the regular website.

Bitdefender’s malware warning

It’s unclear why Bitdefender has listed Rightcorp’s website as malware but it’s certainly plausible that the huge amount of settlement emails linked to a payment request raised a red flag.

In any case, Bitdefender users are less likely to pay up if their anti-virus software warns them not to visit the page, which can only further hurt Rightcorp’s already meager revenues.

Despite sending out millions of notices Rightscorp has yet to turn a profit. The company continues to trade at a loss and recently increased its settlement amount by 50 percent, hoping to get out of the red.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and the best VPN services.