1、研究人员成功接管勒索软件Cerber临时服务器
标题:Misconfigured Server Gives Insight Into Cerber Ransomware Operation
作者信息:January 13, 2017 By Catalin Cimpanu
//BEGIN
Security researchers have gained access to one of the servers used by the Cerber gang, from where they were able to extract basic statistics about their operation.
A security researcher that only goes by the nickname of Racco42 discovered the vulnerability on Thursday, January 12.
The issue affected only one Cerber server, not all, and was most likely due to a misconfiguration. The server wasn't a command and control server, but a mere staging server from where the victims' computers would connect and download the actual ransomware, which would later run and infect their PCs.
勒索软件Cerber用于存放恶意代码的服务器被安全公司的安全人员发现存在可以被利用的漏洞。漏洞的原因是由于该服务器设置不正确导致。因此能轻易的进入该服务器(不是所有的Cerber勒索软件的所有服务器),对这个服务器的内部的分析发现了一下有趣的现象:该勒索软件的一些统计数据以及其具体的活动。
//END
This is not the first time security researchers hack their way into the servers of malware authors. Something similar happened in June 2016, when ISC Sans security researchers managed to gain access to a phishing server.
In the winter and spring of 2016, security researchers hacked their way into servers belonging to the Dridex gang and replaced payloads for the Locky ransomware with antivirus installers and sarcastic or offensive messages.
In one of those case, security firm Buguroo recovered data about victims infected with the Dridex banking trojan.
其实这已经不是第一次安全公司的研究人员“进入”恶意代码作者的服务器。以前的钓鱼网站的服务器、Dridex木马的服务器、Locky勒索软件的服务器等都曾被安全人员光顾。
点评:对付勒索软件,建议采用备份备份再备份的3B原则:Backup、Backup、Backup(Beifen、Beifen、Beifen)。 |