If anything, this particular revelation shows the dark sense of warped humor by malware peddlers and cybercriminals on the internet.
The Guardian, a prominent UK publication had published an article which headlined “Cybercrime: Is it out of Control?” that claimed cybercriminals getting more audacious over time. Sure enough, cybercriminals audaciously injected a malicious URL into the syndicated links embedment on the page that redirected users to the dreaded Angler Exploit Kit malware.
The discovery of the malware was made by security researchers J.Gomez, Kenneth Hsu and Kenneth Johnson at security firm FireEye on December 1, 2015.
A new series of drive-by campaigns that are equipped to spread the Angler exploit kit to subsequently shove the most infamous ransomware of them all, Cryptowall, has been discovered.
A team of security researchers at Heimdal Security have uncovered a new batch of malicious drive-by campaigns. The new strain spreads the Angler exploit kit by injecting malicious code into targeted web pages. The researchers note the destructive potential of the campaigns due to the malware authors’ comprehensive objectives and the attack mechanisms used.
The complete account of the malware discovery can be found here.
If the campaign is effective, the [...]
A team of security researchers have uncovered a malicious SEO campaign that targets unsuspecting users through compromised URLs via script injections.
A malware-laced SEO campaign has infected popular keyword searches on Google such as Java JRE, Windows 8 and MSN to affect hundreds of thousands of searches that routinely occur every month. The discovery was one by the security team at Heimdal who uncovered the campaign containing “compromised web pages and dozens of script injections.”
The blog post detailing the observation can be found here.
An unsuspecting user would simply have to search with a targeted keyword and visit the faux web page while looking for [...]
Cisco Talos managed to disrupt a major ransomware campaign that researchers believe netted a hacker more than $30 million per year. The team determined that the Angler Exploit Kit used proxy servers of service provider Limestone Networks with the primary threat actor responsible for up to 50 percent of Angler Exploit Kit activity, according to a report on the Talos website. The attackers targeted as many as 90,000 victims per day.
Talos gained visibility into the network’s global activity through a collaboration with Level 3 Threat Research Labs. Thanks to this collaboration, the researchers were able to gain visibility into the attackers’ domain activity, Talos [...]