![]() |
PCDVD數位科技討論區
(https://www.pcdvd.com.tw/index.php)
- 七嘴八舌異言堂
(https://www.pcdvd.com.tw/forumdisplay.php?f=12)
- - 關於勒索病毒,我這幾天遇到的狀況。
(https://www.pcdvd.com.tw/showthread.php?t=1128506)
|
---|
引用:
我自己是很想用這套,不過跟我使用的環境似乎大大的有影響 殘念... :cry: |
引用:
真的喔? 請拿點證據出來吧. 樓上那個就更好笑了, 啥鬼 exe ? 在我的平台還要先掛 wine 才能跑噎, 啥是wine 你可能要問辜狗一下. 現在我只知道 .dmg 與 .deb :laugh: 隔壁靈異 有個傻B還在替病毒作者打****, 說可以殺價喔, 有興趣殺價的可比照辦理, 代貼廣告文可以殺價喔, 意者從速. |
引用:
https://vms.drweb.com/virus/?i=7704004&lng=en https://labs.bitdefender.com/2015/1...encryption-key/ http://www.ithome.com.tw/news/99948 Linux勒索軟體有漏洞!資安業者Bitdefender釋出解密工具 Bitdefender發現,Linux.Encoder.1勒索軟體中含有一漏洞,讓他們得以直接回覆AES金鑰而不必利用RSA來解鎖。不過,Bitdefender的解密工具並非百分之百可行,也些還是無法解開的。 按讚加入iThome粉絲團 文/陳曉莉 | 2015-11-13發表 圖片來源: 維基共享資源;作者:Mbz1 日前資安業者Doctor Web發現首款針對Linux平台的Linux.Encoder.1勒索軟體,駭客以該軟體將Linux系統上的檔案加密,並要求受害者支付1個比特幣的贖金。不過,另一資安業者Bitdefender釋出解密工具,得以解救多數遭到Linux.Encoder.1加密的檔案。 Bitdefender說明,Linux.Encoder.1利用開放源碼的Magento內容管理系統漏洞入侵Linux平台,執行後它會以AES加密系統上的檔案,再以RSA加密對稱金鑰,但會放過重要的系統檔案,以讓系統仍能重新運作,之後作者即會要使用者支付贖金以取得RSA私鑰來解鎖AES對稱金鑰。然而,Bitdefender發現,該勒索軟體中含有一漏洞,讓他們得以直接回覆AES金鑰而不必利用RSA來解鎖。 因此,Bitdefender打造一個解密工具,可自動回覆所有受影響的檔案,若受害者能夠重新啟動系統,只要下載該工具,再以最高權限執行即可。 Bitdefender說,這堪稱是個死裡逃生的機會,加密勒索軟體引起高度重視的原因之一是它們會確保受害者在支付贖金之前無法解密檔案。Encoder勒索軟體所出現的錯誤是極幸運也極罕見的,他們依舊建議網管人員不要以最高權限執行不完全信任的程式,安裝安全解決方案並經常備份。 不過,Bitdefender的解密工具並非百分之百可行,主要是因為部份受害者重覆感染了Encoder,導致不同的檔案被不同的金鑰加密,甚至造成某些檔案無法修復,還有一些案例是連勒索訊息都被加密了。(編譯/陳曉莉) ---------------------------------------- Linux.Encoder.1 Added to Dr.Web virus database: 2015-11-05 Virus description was added: 2015-11-06 SHA1: a5054babc853ec280f70a06cb090e05259ca1aa7 (x64, UPX) 98e057a4755e89fbfda043eaca1ab072674a3154 (x64, unpacked) 810806c3967e03f2fa2b9223d24ee0e3d42209d3 (x64, FreeBSD) 12df5d886d43236582b57d036f84f078c15a14b0 (x86, UPX) 5bd6b41aa29bd5ea1424a31dadd7c1cfb3e09616 (x86, unpacked) Encryption ransomware for Linux written in C using the PolarSSL library. Once launched with administrator privileges, the Trojan loads into the memory of its process files containing cybercriminals' demands: ./readme.crypto—file with demands, ./index.crypto—HTML file with demands. As an argument, the Trojan receives the path to the file containing a public RSA key. Once the files are read, the malicious program starts as a daemon and deletes its original files. First, the Trojan encrypts files in the following directories: /home /root /var/lib/mysql /var/www /etc/nginx /etc/apache2 /var/log After that, Linux.Encoder.1 encrypts all files in home directories. Then the Trojan recursively traverses the whole file system starting with the directory from which it is launched; next time, starting with a root directory (「/」). At that, the Trojan encrypts only files from directories whose names start with one of the following strings: public_html www webapp backup .git .svn At that, the Trojan encrypts only files with the following extensions: ".php", ".html", ".tar", ".gz", ".sql", ".js", ".css", ".txt" ".pdf", ".tgz", ".war", ".jar", ".java", ".class", ".ruby", ".rar" ".zip", ".db", ".7z", ".doc", ".pdf", ".xls", ".properties", ".xml" ".jpg", ".jpeg", ".png", ".gif", ".mov", ".avi", ".wmv", ".mp3" ".mp4", ".wma", ".aac", ".wav", ".pem", ".pub", ".docx", ".apk" ".exe", ".dll", ".tpl", ".psd", ".asp", ".phtml", ".aspx", ".csv" The Trojan does not encrypt files in the following directories: / /root/.ssh /usr/bin /bin /etc/ssh To encrypt each file, the Trojan generates an AES key. After files are encrypted using AES-CBC-128, they are appended with the .encrypted extension. Into every directory that contains encrypted files, the Trojan plants a README_FOR_DECRYPT.txt file with a ransom demand. If decryption is initiated, Linux.Encoder.1 will use a private RSA key to retrieve AES keys from encrypted files, traverse directories in the same order as when they were encrypted, and delete README_FOR_DECRYPT.txt files trying to decrypt all files with the .ecnrypted extension. Doctor Web security researchers have developed a decryption technique that may help restore files encrypted by this malicious program. Curing recommendations -------------------------------- ANTI-MALWARE RESEARCH Linux Ransomware Debut Fails on Predictable Encryption Key November 9, 20156 Min Read Bogdan BOTEZATU bbotezatu 182 Comments Share This! No need to crack RSA when you can guess the key —————————– Update: There have been some developments regarding this ransomware. It was brought to our attention that the decryption tool was not working on particular cases. Upon investigation we were surprised to find out that some victims were infected more than one time (the ransomware was accidentally started more than once). This means that some files were encrypted using a key, and others using another set of keys. However, in so doing, the race condition generated leads to some files getting irreparably damaged (their content is truncated to zero). And in some cases even the ransom notes became encrypted! We updated the decryption utility and the README. Please read it for the new instructions. /update File-encrypting ransomware Trojans are almost ubiquitous on Windows, and it was only a matter of time until the advent of the first piece targeting Linux. Dubbed Linux.Encoder.1, this first piece of Linux ransomware is extremely similar in behavior to CryptoWall, TorLocker and other notorious ransomware families for Windows. How does it work? Linux.Encoder.1 is executed on the victim's Linux box after remote attackers leverage a flaw in the popular Magento content management system app. Once executed, the Trojan looks for the /home, /root and /var/lib/mysql folders and starts encrypting their contents. Just like Windows-based ransomware, it encrypts the contents of these files using AES (a symmetric key encryption algorithm), which provides enough strength and speed while keeping system resources usage to a minimum. The symmetric key is then encrypted with an asymmetric encryption algorithm (RSA) and is prepended to the file, along with the initialization vector used by AES. Once the files have been encrypted, the Trojan attempts to also encrypt the contents of the root (/), skipping only critical system files, so the operating system will be able to boot up again. At this point, it would be safe to assume that users can't get their data back unless they pay the operators a fee in exchange for the RSA private key to decrypt the AES symmetric one. However, a major flaw in the way the Encoder Trojan is designed allowed Bitdefender researchers to recover the AES key without having to decrypt it with the RSA private key. A primer on encryption Throughout 2015, most crypto-ransomware Trojans have used mixed encryption algorithms to hold valuable information hostage. To rapidly and effectively encrypt large amounts of data, crypto-ransomware Trojans rely on the Advanced Encryption Standard (AES for short) – an encryption algorithm that uses a symmetric key (the same key for both encryption and decryption). To avoid interception of the encryption key as it is sent from the command and control server, crypto-ransomware operators usually complement AES with RSA (an asymmetric key encryption algorithm). RSA generates a pair of complementary public-private keys – the public key is used for encryption and the private one for decryption. These keys are usually generated on the hackers' server and only the public key gets sent to the victim PC. Since RSA is less resource-effective on big chunks of data, the public key is only used to encrypt a small, yet critical, piece of information: the encryption key used by the AES algorithm that is generated locally. The RSA-encrypted AES key is then prepended to the beginning of every encrypted file, along with the original file permissions and an initialization vector (IV) used by the AES algorithm. The million-dollar flaw We mentioned that the AES key is generated locally on the victim's computer. We looked into the way the key and initialization vector are generated by reverse-engineering the Linux.Encoder.1 sample in our lab. We realized that, rather than generating secure random keys and IVs, the sample would derive these two pieces of information from the libc rand() function seeded with the current system timestamp at the moment of encryption. This information can be easily retrieved by looking at the file's timestamp. This is a huge design flaw that allows retrieval of the AES key without having to decrypt it with the RSA private key sold by the Trojan's operator(s). Automated decryption tool now available Bitdefender is the first security vendor to release a decryption tool that automatically restores affected files to their original state. The tool determines the IV and the encryption key simply by analyzing the file, then performs the decryption, followed by permission fixing. If you can boot your compromised operating system, download the script and run it under the root user. Here is a step-by-step walkthrough to get your data back: – Download the script from the Bitdefender Labs repository [link updated to include the fix for the recent |
引用:
可以不要再鬧笑話了好嗎? 我都懷疑這隻病毒根本是資安業者寫的. 還自己寫了業配文... |
Bitdefender 應該沒那樣多閒工夫,沒那樣多人力
前陣子才被勒索從神壇踢下來 他們本來也是入庫不快那種,想說靠主防能擋大部分 比較有充裕時間可以慢慢分析 結果某系列勒索讓它們接連破功.... 這次一粒那個病毒,某家買BD引擎的防毒 還自己先入庫xd |
引用:
雖說我也是用comodo 不過講真的這個對不懂的人來說不是很好上手 普遍還是希望智能或是傻瓜型防護比較輕鬆 而且你看樓主這篇,還是很多人認為要靠防毒查殺才能擋勒索,要扭轉這種觀念並不容易...... 以你po的影片那位youtuber,她某些設定 用意不是來檔勒索 像防火牆是改成預設拒絕連線,不跳窗通知 她有說因為她是高級使用者...... 初學或是不懂得可能用的程式無法連線被擋 也不會跳窗不知道問題在哪邊 然後又不知道要去哪邊手動加入信任..... 若都照她的設定,可能會反過來怪comodo 不好用........ 另外她也講因為是示範擋勒索,所以關掉HIPS ..... 因為嫌跳窗太煩 :laugh: |
引用:
有沒有閒功夫, 也不是誰說了算. 不過, 到底有誰在使用非 win 系統, 又不是因使用者下載木馬來執行 而中獎的? 我的看法就是到目前為止並沒有看到. 如果有,請提出. 其他的奇奇怪怪廣吉 我沒興趣. (我有爬到一篇有人OSX 下載photoshop 破解工具執行中毒, 這種事 當然不算, 這樣搞沒有系統防得住 .) |
引用:
是你不要鬧笑話了吧 一點基本sense都沒有 還在那邊資安業者自己寫病毒? 會這樣說的根本大外行 最近這幾年pcdvd上真奇怪 都是不懂資安的人講話最大聲 |
這張圖話得很好.
![]() 同意的請直接加入黑名單, 真的沒必要浪費彼此寶貴的時間. |
引用:
HIPS出現已經超過20年,甚至即將邁入30年 如果是狹隘一點的那種unix檔案權限也算的話 那已經出現超過40年 事實上廠商在這部分的教育其實不太充足 尤其台灣人,中毒了,或認為中毒 就是掃描再掃描,一堆根本都是中rootkit 是要掃個甚麼鬼? HIPS要用得好,沒概念是不可能的 再傻瓜的設計,也防不了apt攻擊 就連專家也是會中招 更遑論缺乏相關知識的一般人了 固定好用的HIPS這幾年來就是那幾種 COMODO雖然說友善程度還能再提升 但是某種層面來說它已經相當友善了 不過友善性提高,相對會降低些安全性 雖然如此但總比甚麼都沒用來的要強 其實說也說過不知道說過多少遍了 還是要強調,問題在備份 根本不在防不防得住 |
所有的時間均為GMT +8。 現在的時間是07:32 AM. |
vBulletin Version 3.0.1
powered_by_vbulletin 2025。