Ransomware scum add Joomla to their list
'Admedia' campaign decides the world of WordPress is not enough. Bwaha. Bwahahahaha!
The Internet Storm Center (ISC) has spotted 'admedia attacks' breaking out of their original WordPress vectors.
According to a post late last week, the ISC (courtesy of author Brad Duncan) posted that “the group behind the WordPress 'admedia' campaign” is now attacking Joomla-hosted sites.
The other evolution in the campaign, Duncan notes, is that since it was first noticed at the beginning of this month mostly dropping the Nuclear exploit kit on target sites, it's now added Angler.
Duncan, who is also a security researcher at Rackspace, also notes that the attackers have started using “megaadvertize” in their gateway URLs (instead of “admedia” as was used when the attack was first spotted).
The technique, however, stays the same: the target site is compromised to generate hidden iframes in visitors' browsers, and the malicious URLs act as a “gate between the compromised Website and the EK [exploit kit – The Register] server”.
The overall process, however, remains the same. For example:
- 188.8.131.52 - img.belayamorda.info - admedia gate;
- 184.108.40.206 - ssd.summerspellman.com - Angler EK
- 220.127.116.11 - clothdiapersexpert.com - TeslaCrypt callback traffic
- Black Hat
- Common Vulnerability Scoring System
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- Digital certificate
- Identity Theft
- Kenna Security
- Palo Alto Networks
- Trusted Platform Module
- Zero trust