Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Ransom32 Is a JavaScript-Based Ransomware That Uses Node.js to Infect Users
Softpedia ^ | 3 Jan 2016, 14:54 GMT | Catalin Cimpanu

Posted on 01/03/2016 11:16:43 PM PST by Utilizer

A new type of ransomware has been spotted, the first of its kind, a ransomware that uses JavaScript to infect its users, being coded on top of the NW.js platform.

NW.js, formerly known as Node-WebKit, is a powerful platform that allows developers to create desktop applications via Node.js modules. The platform lets programmers use JavaScript in the same way, and with the same power and reach inside the underlying operating system's guts, as other more powerful languages like C++, Delphi, Java, ActionScript, and C#.

If the name hasn't tipped you off yet, NW.js uses a stripped down version of WebKit, the same layout engine used in Chrome, Safari, and Opera, but without many of its limitations. While browsers limit what JavaScript code can do, NW.js removes these limits and allows JS developers to interact with the OS itself.

NW.js can run on all three major operating systems, meaning that ransomware coded to work on top of it would theoretically be able to target all operating systems at once.

(Excerpt) Read more at news.softpedia.com ...


TOPICS: Computers/Internet
KEYWORDS: internet; javaransomware; javascript; malware; ransomware; security; virus; windows; windows10; windows8; windowspinglist; windowsxp
Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last
To: Swordmaker

bookmark


21 posted on 01/04/2016 3:27:42 AM PST by japaneseghost
[ Post Reply | Private Reply | To 8 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

22 posted on 01/04/2016 4:11:27 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jeff Chandler

Modern websites, like FR, don’t need no steekin’ Yava Script....


23 posted on 01/04/2016 4:28:09 AM PST by Paladin2
[ Post Reply | Private Reply | To 10 | View Replies]

To: Swordmaker
"TURNING OFF JAVASCRIPT"

It's not necessary to turn off Javascript in your browser.

This "attack" is nothing more than running a desktop type app on your computer. It doesn't involve the browser at all.

So, DON'T PANIC! :-)

Also, don't execute (click on) any email attachments. That's how this is distributed, not via website.

(BTW, even though this is billed as "cross platform", any individual instance of it will be for a specific platform like Windows or Mac. That's because there's a bundled runtime that uses native code.)

24 posted on 01/04/2016 4:53:36 AM PST by PreciousLiberty
[ Post Reply | Private Reply | To 6 | View Replies]

To: PreciousLiberty; All

Sorry, should have pinged everyone on this thread the first time.

See my previous message for the real scoop on this malware.


25 posted on 01/04/2016 5:12:50 AM PST by PreciousLiberty
[ Post Reply | Private Reply | To 24 | View Replies]

To: Utilizer; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
New Cross-Platform Ransomware ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Utilizer for the ping!!

26 posted on 01/04/2016 5:56:02 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
A javascript based cross platform ransomware attack. So far Windows only, but based on how it works could jump to other OSes and devices. Watch that SPAM email! - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

27 posted on 01/04/2016 6:03:26 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: TheCipher
Wouldn’t it be safer to just not run as administrator ( which you should never do - always run with non admin privileges ) in the first place instead of disabling javascript ?

Ransomware typically doesn't need admin authority. It works by encrypting your working files, and then they offer to sell you the key to get them decrypted. Since it's running under your credentials, it can encrypt any file you have write access to.

28 posted on 01/04/2016 6:38:37 AM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: PreciousLiberty
It's not necessary to turn off Javascript in your browser.

I am not certain of that at this point. If it can use Javascript, there is no reason it cannot exist as a script on a webpage as it also links through Webkit. Until I see positive proof this new version of ransomware is not capable of coming through that means, I'd rather be safe than sorry. It's a small sacrifice for a short time to assure safety.

(BTW, even though this is billed as "cross platform", any individual instance of it will be for a specific platform like Windows or Mac. That's because there's a bundled runtime that uses native code.)

As the article says, although right now it is only written for Windows PCs, it is a short step to build a version that carries code for all platforms, Precious Liberty, so that is not quite true.

29 posted on 01/04/2016 9:21:44 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Utilizer

For anyone who is really paranoid about losing their data or having passwords stolen, I would recommend:

1) Set up two computers.

2) The first computer is isolated and never connected to a network or the Internet. Keep your data and applications there. That machine can safely use whatever OS you prefer.

3) The second computer is intended for browsing and other internet activities (such as web mail). It has no hard drive (but lots of RAM) and is booted up from a Linux boot disk. There is nothing that malware can corrupt. Every time you turn this computer off, all cached files, browsing history, session passwords, and any malware goes “poof”.


30 posted on 01/04/2016 9:34:35 AM PST by TexasRepublic (Socialism is the gospel of envy and the religion of thieves)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
"I am not certain of that at this point. If it can use Javascript, there is no reason it cannot exist as a script on a webpage as it also links through Webkit. Until I see positive proof this new version of ransomware is not capable of coming through that means, I'd rather be safe than sorry. It's a small sacrifice for a short time to assure safety."

I am certain. Read the following carefully:

NW.js, formerly known as Node-WebKit, is a powerful platform that allows developers to create desktop applications via Node.js modules. The platform lets programmers use JavaScript in the same way, and with the same power and reach inside the underlying operating system's guts, as other more powerful languages like C++, Delphi, Java, ActionScript, and C#.
NW.js is distinct from the Webkit embedded in browsers. The browser version is sandboxed, preventing it from accessing local resources in the fashion a desktop app would, like acessing local disk files. If the Javascript sandbox for any major browser were broken, there would be a major security alert across the industry - which this is not.

"As the article says, although right now it is only written for Windows PCs, it is a short step to build a version that carries code for all platforms, Precious Liberty, so that is not quite true."

The article says:

but we may be one update cycle away from seeing the first truly cross-OS ransomware family.
A "cross-OS ransomware family" is different from a single program that runs on the various OS. It potentially wouldn't be that hard to target particular OS users with a particular attack email anyhow.

If you want to read about the involved (and very different for each target OS) packaging process, I refer you to:

https://github.com/nwjs/nw.js/wiki/how-to-package-and-distribute-your-apps

31 posted on 01/04/2016 10:06:30 AM PST by PreciousLiberty
[ Post Reply | Private Reply | To 29 | View Replies]

To: PreciousLiberty; All

Sigh...once again forgot to include “All”. Please read my last post for more information on this malware.


32 posted on 01/04/2016 10:08:43 AM PST by PreciousLiberty
[ Post Reply | Private Reply | To 31 | View Replies]

To: TexasRepublic

Set up a virtual machine and use it to browse and do email.


33 posted on 01/04/2016 10:12:05 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: AppyPappy

“Set up a virtual machine and use it to browse and do email.”

That would probably be sufficient, but I would always have a nagging doubt whether a virtual machine would be immune to any exploit. I have more faith in the air gap between physical machines!


34 posted on 01/04/2016 10:32:14 AM PST by TexasRepublic (Socialism is the gospel of envy and the religion of thieves)
[ Post Reply | Private Reply | To 33 | View Replies]

To: TexasRepublic

It would get exploited but would be segregated from all other data. You just delete the virtual drive and rebuild.


35 posted on 01/04/2016 10:39:22 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: PreciousLiberty

Thanks for that information, PreciousLiberty.


36 posted on 01/04/2016 11:27:12 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Swordmaker
You do not have to disable Javascript in the browser because of this. From the article:
Malware operators place a malicious file inside emails masquerading as unpaid invoices, delivery notifications, and such, which when downloaded and launched by unsuspecting victims go on to contact a C&C (command and control) server, where the malware operator tells it to download a particular type of malware (Ransom32 in this case).
To get infected, you have to open an attachment in a spam email, which you should never do in the first place. When you do, and the malicious code runs, it downloads a certain Javascript runtime and executes malicious code that uses it. The Javascript in your browser has nothing to do with any of this.
37 posted on 01/04/2016 11:43:13 AM PST by cartan
[ Post Reply | Private Reply | To 29 | View Replies]

To: Swordmaker
But it needs "Node.js" to be installed first - which is not the default.

https://nodejs.org/en (Node home page
38 posted on 01/04/2016 7:42:06 PM PST by mbj (My two cents)
[ Post Reply | Private Reply | To 17 | View Replies]

bttt


39 posted on 01/04/2016 9:00:40 PM PST by Unrepentant VN Vet (God gives us rights; Governments take them away....if we let them.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Jeff Chandler

Nice snarky response... except that one of the dangers of a js exploit is that it won’t necessarily be picked up by antivirus software...


40 posted on 01/05/2016 8:45:37 PM PST by TheBattman (Isn't the lesser evil... still evil?)
[ Post Reply | Private Reply | To 11 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson