Announcement

Collapse
No announcement yet.

If you're a server admin, you need to see this.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • If you're a server admin, you need to see this.

    Page 1 of 22 - New ransomware called Anti-Child Porn Spam Protection or ACCDFISA - posted in Archived News: Important Information! Update 03/13/13: A method may be available to generate the decryption password for your files. For more information please see this post: http://www.bleepingcomputer.com/forums/t/449398/new-ransomware-called-anti-child-porn-spam-protection/?p=3001838 A new variant of the Malware Protection ransomware has been released called Anti-Child Porn Spam Protection...


    This pertains to M$ Server '03 primarily, but is M$ specific. The first post is mostly accurate, however, the latest variant does actually encrypt the data with 128bit AES and deletes any backups you have on the local machine.

    Harden your servers stat!

    Saved and Texan by the Grace of God, Redneck by choice.
    Last edited by Tx Redneck; 09-02-2013, 01:02 PM.

  • #2
    Here's a detailed breakdown of the attack. http://blog.emsisoft.com/2012/04/11/...ndows-servers/

    Saved and Texan by the Grace of God, Redneck by choice.

    Comment


    • #3
      Is this English?
      Token Split Tail

      Originally posted by slow99
      Lmao...my favorite female poster strikes again.
      Originally posted by Pokulski-Blatz
      You are a moron .... you were fucking with the most powerful vagina on DFW(MU)stangs.

      Comment


      • #4
        Originally posted by Leah View Post
        Is this English?
        Of course it is. Just remember, If we index the card, we can get to the EXE monitor through the haptic COM capacitor.
        "It is in truth not for glory, nor riches, nor honours that we are fighting, but for freedom - for that alone, which no honest man gives up but with life itself."

        Comment


        • #5
          This doesn't appear to be new or innovative or really 2003 specific.

          The "attacker" is just scoping for any servers with an open RDP port. Once found, it'll run a brute force attack on a preset list of usernames hoping it gets lucky.

          1) it appears to be local user accounts only unless i missed something
          2) if it does attempt to scope domain accounts, simple blocks are (and already should be):
          - rename their administrator account and put a dummy account in its place
          - require strong passwords/lockouts via group policy

          Other than that, which is something thats been going on everyday and night for 10+ years anyway, the payload is nothing more than a script kiddie package.

          Disable autorun from all drives, perform backups of data on the server and run a good spam/malware front and backend. Anyone not doing any of the above deserves to get their digital ass handed to them.

          If someone RDP's into your server with the administrator password, a delete and encryption script is the least of your worries.

          Comment


          • #6
            I posted in the BP as a heads up if anyone is in this type of admin role and because I had buddy contact me about trying to remedy one of these, but I'd not heard of it when he asked.

            After a lil research, I was/am flabbergasted that 1 a server was left so open like this, and 2 that someone is successfully extorting money and reeking havoc on small businesses like this.

            Saved and Texan by the Grace of God, Redneck by choice.

            Comment


            • #7
              What version of Linux does this apply too? /Abecx

              Comment


              • #8
                Originally posted by yellowstang View Post
                What version of Linux does this apply too? /Abecx

                Heh

                Saved and Texan by the Grace of God, Redneck by choice.

                Comment


                • #9
                  No 1. any server admin/infrastructure worth a damn would not have rdp publicly accessible.

                  Even small businesses can avoid this very easily.

                  Comment

                  Working...
                  X