International Exploit Kit Angler Thwarted By Cisco Security Team 36
An anonymous reader writes: Researchers at a Cisco security unit have successfully interrupted the spread of a massive international exploit kit which is commonly used in ransomware attacks. The scientists discovered that around 50% of computers infected with Angler were connecting with servers based at a Dallas facility, owned by provider Limestone Networks. Once informed, Limestone cut the servers from its network and handed over the data to the researchers who were able to recover Angler authentication protocols, information needed to disrupt future diffusion.
Fraud detection? (Score:2, Informative)
"The servers had been hired by cybercriminals using stolen payment details."
Regardless of what was hosted on those servers, how did Limestone allow that many fraudulent accounts to get through? (rhetorical question btw...revenue is revenue if you know what I mean, wink wink)
Btw, here's a very good in-depth description of Angler (i.e. yet another Microsoft Windows exploit):
https://blogs.sophos.com/2015/... [sophos.com]
Re: (Score:1)
"The servers had been hired by cybercriminals using stolen payment details."
Regardless of what was hosted on those servers, how did Limestone allow that many fraudulent accounts to get through? (rhetorical question btw...revenue is revenue if you know what I mean, wink wink)
Back to reality.. that's not really how it works. This is not revenue when you have to refund in a week after these proxy servers have used terabytes of bandwidth, techs have spent hours provisioning the server, handling abuse associated with the fraud servers, etc. The providers hosting angler and other botnets are getting ripped off the same way the users downloading it are.
Blocking the Japanese ministry of agriculture? (Score:4, Interesting)
The published Angler nginx proxy server configuration contains
deny 150.26.0.0/16;
That block belongs to the Japanese "Ministry of Agriculture,Forestry and Fisheries - Agriculture,Forestry and Fisheries Research Council". I wonder what the story is behind that.
Re: (Score:3)
Its common for intelligence organizations to label their IP block with other gov org names. Many of the SSH brute force scans I bothered to look up a few years ago originated from IP blocks owned by "China Railway Telecommunications Center".
Re: (Score:2)
http://entertainment.slashdot.... [slashdot.org]
They were likely just monitoring the botnet to ensure it wasn't used to deface the wiki article.
Re: (Score:2)
Re: (Score:2)
Two thirds of "pun" is "P-U." (Best said aloud.) Either way, that was wrong and you should feel bad. Cod as my witness, if you do that again, I'll beat you until you flounder on the floor. You dirty bass-tard.
*sighs*
I'm not proud.
Re: (Score:2)
It's probably address space shared by Yakuza too. Someone learned a lesson the hard way
Re: (Score:2)
That block belongs to the Japanese "Ministry of Agriculture,Forestry and Phisheries - Agriculture,Forestry and Phisheries Research Council".
FTFY
Re: (Score:2)
It would be awesome if Slashdot did a Snowden interview. I'd throw some funds at it if it were possible.
Law enforcement? (Score:1)
When did Cisco become law enforcement? The research is interesting, but vigilante justice is kind of frowned upon here.
Re:Law enforcement? (Score:4, Insightful)
Understandable.
But what is the alternative? File a police report and wait for them to do something about it?
Re: (Score:2, Informative)
Re: (Score:1)
It's just misinformed whinging for the sake of whinging. We used Cisco gear. We replaced it with Juniper because it was much less expensive.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I thought you had to pay for the 'community' Snort policies? I played with it a while back (I'm just a geek - I have no expertise, use case, or anything) and found that I wasn't even able to import the definitions though they claimed I could during my trial period.
I was, it seems, doing it wrong. That's not surprising but if I don't poke and break then I am not learning. If I am not learning then I am not growing. If I am not growing then I serve no function. If I am serve no function I have no place. If I
Re: (Score:1)
obvious question (Score:5, Funny)
yes, it was interrupted but was this a non-maskable interrupt? ;)
Re: (Score:2)
(no mod points)
Limestone Networks taking action you say? (Score:2)
Re: (Score:2)
I'm going to hazard a guess that law enforcement was involved, otherwise I doubt any ISP would just hand over data.
I'm just paranoid enough to assume most large US corporate funded security research teams are in daily, if not weekly, contact with authorities.
I see Limestone is still a cesspool (Score:2)
they've been a spam haven for years. LARTS to them usually get ignored, so I ended up firewalling them a long time ago.