Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Java Crime Microsoft Networking Security Windows Linux

New Java-Based Ransomware Targets Linux and Windows Systems (zdnet.com) 37

"A newly uncovered form of ransomware is going after Windows and Linux systems," reports ZDNet, "in what appears to be a targeted campaign." Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique that helps stay hidden on compromised networks. The main targets of Tycoon are organisations in the education and software industries.

Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It's an unusual form of ransomware because it's written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions... [T]he first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing Remote Desktop Protocol servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords. Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings that more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack...

After execution, the ransomware encrypts the network with files encrypted by Tycoon given extensions including .redrum, .grinch and .thanos — and the attackers demand a ransom in exchange for the decryption key. The attackers ask for payment in bitcoin and claim the price depends on how quickly the victim gets in touch via email.

The fact the campaign is still ongoing suggests that those behind it are finding success extorting payments from victims.

This discussion has been archived. No new comments can be posted.

New Java-Based Ransomware Targets Linux and Windows Systems

Comments Filter:
  • by backslashdot ( 95548 ) on Saturday June 06, 2020 @09:36PM (#60154748)

    The biggest news here is that Blackberry still exists.

    • Volunteering for brain surgery?

    • Can anything ever truly be made secure, particularly anything that's continually adding new features?

      I mean sure, maybe it's technically possible in the same way that a pair of 20 year old college girls might knock on my door with a six pack of my favorite beer and an awful fierce yearning, but I'm not holding out any hopes.
      • Sure it can. Try under ZOS (IBM) or BSD. Both have immutable on boot concepts, both set ACL's on processes. Furthermore any attempted abuses are logged. Both can tie down what an administrator can do. Both enforce program paths. Probably Linux and some VM's can stop excesses of abuse. On IBM, you also have security exits that can 'catch' unforseen abuses. But if you run a toy operating system, all bets are off. First thing I learnt was to disable and cripple admin, and have a superman account for those occ
    • by mark-t ( 151149 ) <markt.nerdflat@com> on Saturday June 06, 2020 @11:28PM (#60154904) Journal

      I have no inclination to want to change your mind, but your comment is irrelevant.

      This vulnerability is exploited through a trojan.

      Once you can convince and end user to execute arbitrary executables on their operating system in the first place, it generally doesn't matter what language it was developed in.

      The underlying exploit described here is not in any way especially connected to Java.

      • Once you can convince and end user to execute arbitrary executables on their operating system in the first place, it generally doesn't matter what language it was developed in.

        The underlying exploit described here is not in any way especially connected to Java.

        In this case, the attack was via RDP, in which case it seems the passwords were known. There was no security here.

        RDP, sh, cmd and java are all part of the same delivery mechanism here.

      • Not really. Java is wrongly perceived by some as a safer binary because it generates bytecode, not CPU code.And other people confuse Java with Javascript.
  • Well since it is java, we will be able to stop it before it does any damage due to its speed :)

    I'll be here all week - dha dum

  • RDP, another fine Microsoft product.

    And Java from Oracle. (yeah I know Sun, but it's Oracle's problem now)

    The gifts that keeps giving.

  • Java? (Score:5, Insightful)

    by idontusenumbers ( 1367883 ) on Saturday June 06, 2020 @10:36PM (#60154820)

    I feel like this is an unfair slight against java. Is slashdot going to go retroactively update all the previous malware posts to say "written in c++"? or "All the expliots are targeting buffer overflows because the software was written in c++?"?

    • Only when C/C++ based malware becomes relatively unusual.

    • What's weird about this malware is that it's written in Java.
      That's a strange choice for a malware, to require a compatible JRE.

    • The article is not mocking Java for being exploitable nor rendering inferior to other languages.

      It is just about how skilled people are using unconventional languages to perform the same old activities.

      Actually, I'm not even surprised, trying to exploit a platform to convey their own agenda will be regardless of a particular language.

      You would not select a language to exploit a platform, you would study a platform to know how to breach it.

      It is not that C/C++ were made exploitable friendly, it w
  • by clovis ( 4684 ) on Saturday June 06, 2020 @10:43PM (#60154824)

    The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack.

    So the attack uses privileges. Huh. So why don't we remove all privileges to stop this? (joking)
    Anyway, changing the IFEO key requires admin privileges as does using ProcessHacker to stop the anti-malware service.

    This is big news!
    We have learned that people who have servers with remote logins exposed to the Internet with weak passwords on admin accounts can have problems.
    Why doesn't someone let us know about the risks in doing that?

    • by gweihir ( 88907 )

      Thanks for the finding (was too lazy to read the details). So badly behind patches or weak passwords on admin accounts. Looks like I can ignore this one, at least on my personal servers.

  • This is peak Java! Write once, run anywhere, even malware!!
  • by gweihir ( 88907 ) on Saturday June 06, 2020 @11:13PM (#60154866)

    Since the criminals behind malware have finally (from their perspective) found a good, reliable revenue stream, ransomware is going to get better and better. They now apparently have well-structured teams, development and deployment processes, etc. And since so many organizations have IT security that sucks, this is not going to change anytime soon. The move to Java is probably because you can get developers more easily and because they can target more than one platform with the same code.

    • "The move to Java is probably because you can get developers more easily and because they can target more than one platform with the same code."

      Another outstanding reason not to put Java on your PC.

      • by Luthair ( 847766 )
        Except the part where this has nothing to do with having java on your PC, the attackers simply package the runtime. The real answer is don't expose insecure applications like RDP on the internet.
        • by gweihir ( 88907 )

          The real answer is don't expose insecure applications like RDP on the internet.

          Well, the stupidity of that is staggering. But so is, say, not protecting your AWS container with a password before dumping your customer database in it. And that seems to happen regularly.

          The actual problem is far too many coder, system administrators and other IT folks that are simply incompetent. And the problem behind that is stupid hiring managers that hire for cheap and do not realize they are paying a huge price for that.

          Time will fix this, and eventually you will have to be a real engineer to do IT

  • by Uldis Segliņš ( 4468089 ) on Sunday June 07, 2020 @01:51AM (#60155134)
    How exactly Linux comes into picture here? Java, ohh then Linux vulnerable too. Bullshit! RDP is Windows, IFEO is Windows, ProcessHacker is Windows. So, check your facts before publishing! And what exactly does this gem mean: "the ransomware encrypts the network with files encrypted by Tycoon"? Encrypt network with files? Really? Maybe dig grave with a degree?
    • The article was written by yet another clueless tech writer. I think their thought process goes something like: Windows does it this way, and Linux must do it the same way since Windows is Some How Invented Terribly, and there is no other way to do it. So if Windows is vulnerable, Linux must be vulnerable, too.

    • Re: (Score:3, Informative)

      by willkane ( 6824186 )
      The actual exploit was found on Windows, and the article states:

      "The malicious JRE build contains both Windows® and Linux® versions of this script, suggesting that the threat actors are also targeting Linux® servers:"

      And at the beginning in the overview the article states:

      "Tycoon is a multi-platform Java ransomware targeting Windows® and Linux® that has been observed in-the-wild since at least December 2019"

      In other words, the exploit was found on Windows and they assume
  • Too bad I don't install Java on anything, ever. It's shitware.

    Dang, I guess I miss out AGAIN on this amazing new virus or malware or whatever is is.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...