Post by account_disabled on Dec 26, 2023 11:06:06 GMT 2
Kaspersky warns that outdated browsers can become vulnerable to ransomware attacks. Target found in Asia Pacific Outdated or illegal software is like an open door for malicious users. Kaspersky discovered attack activity targeting Internet Explorer users in the Asia Pacific region. According to Kaspersky Security Network (KSN), an exploit kit named “Magnitude EK” has been developed and is attempting to infect users in South Korea, Taiwan, and Hong Kong with new vulnerabilities. Boris Larin, cyber security researcher at Kaspersky, said: “Magnitude EK is one of the longest-running exploit kits. It was first discovered on underground forums in 2013 and later became a personal piercing kit. That changed owner to a new threat maker. and shifting its focus to sending ransomware to users from countries in the Asia Pacific region through advertising.
Kaspersky's statistics show that this malicious campaign continues to target countries in the Asia Pacific region today, and Magnitude EK often uses its own ransomware as the final payload.” Exploit Email Marketing List kits are typically distributed in packs that include tools for different vulnerabilities. Exploit packs, also known as Exploit packs, are used to identify software installed on a victim's computer. Matched with the list of attacks in the pack. and perform appropriate vulnerability exploits if installed applications are vulnerable. Malvertising refers to the use of online advertisements to distribute malicious programs. Cybercriminals embed special scripts in banners. or redirect users who click on an ad to a special page that contains code for downloading malware. Special methods are used to bypass large ad network filters and place malicious content on trusted websites.
In some cases, visitors don't even need to click on fake ads. The code will run when an ad is displayed. Kaspersky has taken a close look at Magnitude EK and found that Magnitude EK is undergoing continuous development. In February this year, the Magnitude EK outfit switched to exploits. CVE-2019-1367 in Internet Explorer (originally discovered as a zero-day vulnerability) occurred due to a design and development flaw in the system. that the developer was unable to detect before putting the system into actual use) An older version of the campaign's ransomware used to authenticate manually written code. This includes languages in Hong Kong, China, Singapore, Taiwan, South Korea, Brunei and Malaysia, where language ID verification has been removed in newer versions.
Kaspersky's statistics show that this malicious campaign continues to target countries in the Asia Pacific region today, and Magnitude EK often uses its own ransomware as the final payload.” Exploit Email Marketing List kits are typically distributed in packs that include tools for different vulnerabilities. Exploit packs, also known as Exploit packs, are used to identify software installed on a victim's computer. Matched with the list of attacks in the pack. and perform appropriate vulnerability exploits if installed applications are vulnerable. Malvertising refers to the use of online advertisements to distribute malicious programs. Cybercriminals embed special scripts in banners. or redirect users who click on an ad to a special page that contains code for downloading malware. Special methods are used to bypass large ad network filters and place malicious content on trusted websites.
In some cases, visitors don't even need to click on fake ads. The code will run when an ad is displayed. Kaspersky has taken a close look at Magnitude EK and found that Magnitude EK is undergoing continuous development. In February this year, the Magnitude EK outfit switched to exploits. CVE-2019-1367 in Internet Explorer (originally discovered as a zero-day vulnerability) occurred due to a design and development flaw in the system. that the developer was unable to detect before putting the system into actual use) An older version of the campaign's ransomware used to authenticate manually written code. This includes languages in Hong Kong, China, Singapore, Taiwan, South Korea, Brunei and Malaysia, where language ID verification has been removed in newer versions.