Angler EK, Cryptesla 2.2.0 In an Attack on The Independent - How to, Technology and PC Security Forum | SensorsTechForum.com
CYBER NEWS

Angler EK, Cryptesla 2.2.0 In an Attack on The Independent

ransomware-file-encryptionWe often warn our readers about the various threats in the cyber space. Your computer can be compromised even by entering a legitimate, popular website visited on a regular basis. Malicious actors often attack such pages as part of bigger attack scenarios, and hours can pass before the attack is discovered and users are informed.

A bad situation of the sort has happened to The Independent. More precisely, the website’s WordPress-based blog section has been invaded, as reported by Trend Micro. Other WordPress sites may also be currently targeted by bad actors.

Angler Exploit Kit, Cryptesla 2.2.0 Ransomware Spread in the Attack

The security company has reported that the attack has started on the 21st of November. The compromised web page has been delivering the infamous Angler exploit kit and Cryptesla 2.2.0, also known as TeslaCrypt. The vulnerability inflicted in the malicious scenario was identified as CVE-2015-7645.

This is the official description of the particular security flaw, published by CVE Mitre:

Quote Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.

Learn More about Vulnerabilities and Security Breaches

According to researchers, CVE-2015-7645 has been officially added to Angler EK’s repertoire. Most likely, the vulnerability is being used in other malicious attacks as well.

The Attack Explained

The attack was most likely initiated by clicking on a malicious advertising. We have seen multiple malvertising campaigns throughout 2015, many of them spreading ransomware. Users should be extra cautious and think deeply about their systems’ security, as we are currently in the eye of a ransomware storm. Moreover, 2016 malware predictions point that ransomware will not be put to rest any time soon.

A statement by The Independent has been released saying that their WordPress-based blog section is rarely visited, consisting of less than 0.2 per cent from the total online audience. The Independent also claims that there is no evidence about visitors affected by the malicious campaign. Nonetheless, the media is currently analyzing their third-party ad suppliers.

According to Trend Micro’s report, 4,000 redirects to Angler EK happen every day across its whole network.

Angler Exploit Kit Hits Again

As we have already written, Angler has first appeared on the malware horizon in the end of 2013. Since its first appearance, Angler has grown in size and span. It is considered one of the most aggressive exploit kits that successfully evades detection and has various components. For example, researchers at Sophos reported a large number of Angler-infected landing pages in the spring of 2015.

Learn more about Exploit Kit Malicious Campaigns and Protection

donload_now_250
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...