- Home
- News
- Articles+
- Aerospace
- Agriculture
- Alternate Dispute Resolution
- Banking and Finance
- Bankruptcy
- Book Review
- Bribery & Corruption
- Commercial Litigation
- Competition Law
- Conference Reports
- Consumer Products
- Contract
- Corporate Governance
- Corporate Law
- Covid-19
- Cryptocurrency
- Cybersecurity
- Data Protection
- Defence
- Digital Economy
- E-commerce
- Employment Law
- Energy and Natural Resources
- Entertainment and Sports Law
- Environmental Law
- FDI
- Food and Beverage
- Health Care
- IBC Diaries
- Insurance Law
- Intellectual Property
- International Law
- Know the Law
- Labour Laws
- Litigation
- Litigation Funding
- Manufacturing
- Mergers & Acquisitions
- NFTs
- Privacy
- Private Equity
- Project Finance
- Real Estate
- Risk and Compliance
- Technology Media and Telecom
- Tributes
- Zoom In
- Take On Board
- In Focus
- Law & Policy and Regulation
- IP & Tech Era
- Viewpoint
- Arbitration & Mediation
- Tax
- Student Corner
- ESG
- Gaming
- Inclusion & Diversity
- Law Firms
- In-House
- Rankings
- E-Magazine
- Legal Era TV
- Events
- News
- Articles
- Aerospace
- Agriculture
- Alternate Dispute Resolution
- Banking and Finance
- Bankruptcy
- Book Review
- Bribery & Corruption
- Commercial Litigation
- Competition Law
- Conference Reports
- Consumer Products
- Contract
- Corporate Governance
- Corporate Law
- Covid-19
- Cryptocurrency
- Cybersecurity
- Data Protection
- Defence
- Digital Economy
- E-commerce
- Employment Law
- Energy and Natural Resources
- Entertainment and Sports Law
- Environmental Law
- FDI
- Food and Beverage
- Health Care
- IBC Diaries
- Insurance Law
- Intellectual Property
- International Law
- Know the Law
- Labour Laws
- Litigation
- Litigation Funding
- Manufacturing
- Mergers & Acquisitions
- NFTs
- Privacy
- Private Equity
- Project Finance
- Real Estate
- Risk and Compliance
- Technology Media and Telecom
- Tributes
- Zoom In
- Take On Board
- In Focus
- Law & Policy and Regulation
- IP & Tech Era
- Viewpoint
- Arbitration & Mediation
- Tax
- Student Corner
- ESG
- Gaming
- Inclusion & Diversity
- Law Firms
- In-House
- Rankings
- E-Magazine
- Legal Era TV
- Events
Cybersecurity researchers have discovered a very sophisticated Exploit Kit that is targeting countries in the Asia-Pacific region to deliver ransomware via malvertising, which is the spread of malware through online advertisements. Exploit kits are automated threats that utilise compromised websites to divert web traffic, scan for vulnerable browser-based applications, and run...
ToRead the Full Story, Subscribe to
Access the exclusive LEGAL ERAStories,Editorial and Expert Opinion
Cybersecurity researchers have discovered a very sophisticated Exploit Kit that is targeting countries in the Asia-Pacific region to deliver ransomware via malvertising, which is the spread of malware through online advertisements. Exploit kits are automated threats that utilise compromised websites to divert web traffic, scan for vulnerable browser-based applications, and run malware.
Called ‘Magnitude EK’, the constantly evolving Exploit Kit uses its own ransomware as its final payload.
The ransomware comes with a temporary encryption key and list of domain names and the attackers keep changing them frequently, according to the cybersecurity firm Kaspersky.
The Magnitude EK switched to an exploit for the more recent vulnerability ‘CVE-2019-1367’ in an outdated web browser which was originally discovered as an exploited zero-day in the wild. The Magnitude EK is using it as their primary exploit since February 11, 2020.
“Zero day vulnerabilities are very risky for businesses, critical infrastructures, government and financial institutions and consumers who are availing themselves to the exposed browser or networks,” said Dipesh Kaura, General Manager for South Asia, Kaspersky.
Magnitude EK is one of the longest-standing exploit kits. It was on offer in underground forums from 2013 and later became a private exploit kit.
The ransomware delivered by ‘Magnitude EK’ doesn’t encrypt the files located in common folders such as documents and settings, app data, local settings, sample music, tor browser, etc.
Before encryption, the extensions of files are checked against a hash table of allowed file extensions that contains 715 entries. A ransom note is left in each folder with encrypted files and at the end a notepad.exe process is created to display the ransom note. After encryption the ransomware also attempts to delete backups of the files, said the researchers.
“Storing back-up for important data is a basic step that needs to be taken especially by enterprises and government institutions in order to fight against attacks like ransomware”, said Kaura.
The implementation of the Magnitude EK technique in its latest variant was an interesting discovery. Attacks by Exploit Kits have decreased over the years but they still exist, are still active and pose a threat.
“Although Exploit Kits may be less rampant today, they prove to be actively maintained and ever-evolving, which remains a threat to users,” added Boris Larin, Senior Security Researcher, Russia, Kaspersky.