-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Cisco disrupts US$60 million ransomware biz
One way to foil the bad guys is to simply back up your system with a relatively low-cost external hard drive, Biasini said.
Advertisement
The Talos security team, at Cisco, were monitoring the Angler Exploit Kit, which is “currently one of the most effective tools for nicking personal information”, in case you are interested.
One of the web’s most notorious methods for infecting devices with malware has been curtailed by security researchers at Cisco Systems.
Once they win control of a target’s computer, exploit kit buyers can install whatever they want, including so-called ransomware.
“This is a significant blow to the emerging hacker economy where ransomware and the black market sale of stolen IP, credit card info and personally identifiable information are generating hundreds of millions of dollars annually”, Cisco stated in the blog post.
Talos, collaborating with OpenDNS and Level 3 Threat Research, investigated Angler’s telemetry data and found that a large amount of its activity was being generated within a single provider, Limestone Networks. According to the report, researchers found “more than 15,000 unique sites pushing people into the exploit kit, 99.8% percent of which were used less than ten times, illustrating the low frequency”.
To block the attacks, Talos updated products to prevent redirects to the Angler proxy server and patched the vulnerabilities Angler used.
Then Cisco broadcast Angler protocols and mechanisms “so others can protect their communities”, Biasini wrote.
Advertisement
Angler is constructed in a proxy/server configuration, with a single exploit server responsible for serving malicious activity through multiple proxy servers, according to Cisco. “It’s just an intermediary between the proxy servers and the real command-and-control or exploit server”. Much of that activity consisted of ransomeware campaigns, in which an attacker is able to infiltrate a target computer, lock access to it, and threaten to permanently delete all of its files if the machine’s owner does not pay the ransom.