Security Manager's Journal: New ransomware attack hurts trustworthiness of Web
When an infection can result from just calling up a mainstream website, malware becomes harder to battle
Computerworld - Last week, my company was paid a visit by some interesting malware. This time, it was ransomware: malicious software that disguises itself as "security software" but actually holds the system hostage to trick the user into paying money to the software's handlers. This is the same kind of trickery I wrote about when I experienced a FakeAV infection.
Based on that experience, I know this malware is insidious. It embeds itself deeply into the computer, even below the file and operating system levels. There's no point in trying to clean it -- it will just come back. So I instructed the desktop team to wipe the infected computers and reimage them.
We were lucky -- only two users got infected by the compromised ad. The news service displays lots of ads in a rotation, so the chances of getting the compromised one are pretty small, at least on a single visit.
I had my team contact the news service to let people there know about the compromise. Even though it's not their fault directly, they will want to take some kind of action to ensure that other innocent visitors don't experience the same infection. In fact, it's possible the people who run the ad service are unaware that one of their ads is infecting potential customers. There are many ways an attacker can compromise code served up by Web servers, without the knowledge or participation of the webmaster.
I decided the best way to get rid of this particular nuisance is to block the category of all Web advertisements. Who needs them, anyway? (Well as it turns out, some people do -- I received a couple of requests to unblock the ad category, but in general, ads are an annoyance that users don't want). So one outcome of this experience is that my company's Web browsing experience is slightly less annoying than it was before.
More by J.F. Rice
- Security Manager's Journal: Peering behind the firewall
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!