📜 ⬆️ ⬇️

EC Council site infected visitors with extortionate TeslaCrypt software

The website of the well-known certification company in the field of information security EC Council since Monday, March 21, 2016 infected visitors with extortionate software TeslaCrypt .

image

As a source in his blog ( Yonathan Klijnsma ) describes , certain users from certain countries were attacked, namely:


After redirecting from the pages of the site, the victim ended up at the Angler exploit kit page, where flash or silverlight components are used to exploit the vulnerability. Angler exploit kit first launches the Bedep Trojan on the victim's machine, which loads the last payload payload.
As described in the source, the EC Council website most likely uses the well-known CMS Wordpress with a vulnerable module, which turned out to be full of holes and led to infection.
After infection, TeslaCrypt requires the victim 1.5 BTC or $ 622 to decrypt files.
')
For more information, Yonathan left the addresses of Malvari management and distribution servers, so in corporate networks you can add this list to the blacklist:

Bedep C & C:

TeslaCrypt C & C:

Source: https://habr.com/ru/post/280139/


All Articles