Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New (Windows) ransomware strain coded entirely in Javascript
BBC ^ | June 20, 2016

Posted on 06/20/2016 7:31:04 PM PDT by Swordmaker


The script is disguised as a document

Security researchers have discovered a new strain of ransomware coded entirely in Javascript, which could increase its chances of being activated. Unlike executable program files, Javascript documents do not always trigger a security warning on Windows or require administrator access to run.

Named RAA, the malware is disguised as a document and starts encrypting files immediately when opened.

One security expert said the approach was likely to fool many victims. "It's an interesting approach to ransomware," said Ken Munro of security company Pen Test Partners.

"Using Javascript as an attachment to an email is likely to result in many victims accidentally installing it."

(Excerpt) Read more at bbc.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: computers; computing; crime; internet; javascript; malware; ransomeware; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021-4041-47 next last

1 posted on 06/20/2016 7:31:05 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: dayglored

For your ping list as a warning as this WILL run from opening an email which has a document reader attached that can execute a Javascript. It starts encrypting files as soon as it is opened.


2 posted on 06/20/2016 7:32:39 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

“It starts encrypting files as soon as it is opened.”

One of a number of reasons I moved to Linux.


3 posted on 06/20/2016 7:37:37 PM PDT by DaxtonBrown (wrote Harry Reid.s only biography www.futurnamics.com/reid.php)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Windows should be trashed into the dustbin of history.


4 posted on 06/20/2016 7:37:52 PM PDT by sagar
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
We just isolated this on a workstation today, removed it from the domain, yanked the Ethernet cable, and reimaged the whole hard drive. The files were totally shot. The network guys traced it back to a file attachment that was saved out on an accounting drive on a local server, and cleaned it before anyone else could get infected. I did the initial triage, and gave the assist getting the PC scrubbed. What a mess. And this little booger actually changes the desktop wallpaper to insert the ransomware warning as the default background. That's a new one. Little maggots.


5 posted on 06/20/2016 7:41:56 PM PDT by Viking2002 (The gargoyles have taken over the cathedral, methinks.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DaxtonBrown

Javascript works just as well under Linux.


6 posted on 06/20/2016 7:43:51 PM PDT by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: ConservativeMind

Javascript works just as well under Linux.

if you let it


7 posted on 06/20/2016 8:09:01 PM PDT by butlerweave
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

Does anybody know if there would be a problem opening an email with this JavaScript file as an attachment with either a gmail app or gmail via chrome?

Is Google protecting me?

Just hoping.


8 posted on 06/20/2016 8:11:22 PM PDT by InterceptPoint (Still a Cruz Fan but voting for Trump)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

The fools who wrote Javascript seem to have no clue about the “sandbox” theory supposedly behind it.


9 posted on 06/20/2016 8:27:06 PM PDT by GingisK
[ Post Reply | Private Reply | To 1 | View Replies]

To: InterceptPoint

You can disable Windows Script Host or modify the registry to require a .js attachment be double clicked before it can run.

That should prevent malware from being silently installed without user permission.


10 posted on 06/20/2016 8:39:07 PM PDT by goldstategop ((In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever))
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

The company I work at has had several pc’s these past 3 months with ransomware. The caller loses all files as the pc is re-imaged.
In my building we have a network drive we can back up all files to which are backed up everyday. I have done this just in case. thos ein other field offices do not all have access. they need to these days.

Back up your files as your personal photos and other files either online or using an external drive then unplug the drive until the next back up.
The files could all be lost in an instant.


11 posted on 06/20/2016 8:43:32 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

To: GingisK

It is not javascript it is Jscript


12 posted on 06/20/2016 9:09:37 PM PDT by arl295
[ Post Reply | Private Reply | To 9 | View Replies]

To: goldstategop

Article here on bleeping computer

http://www.bleepingcomputer.com/news/security/the-new-raa-ransomware-is-created-entirely-using-javascript/

easy to do

I created a “test.js” in a text editor to verify the fix worked and windows said it blocked it from running


13 posted on 06/20/2016 9:11:24 PM PDT by arl295
[ Post Reply | Private Reply | To 10 | View Replies]

To: InterceptPoint

no because it is jscript

you need to disable the windows script host

http://www.bleepingcomputer.com/news/security/the-new-raa-ransomware-is-created-entirely-using-javascript/


14 posted on 06/20/2016 9:13:32 PM PDT by arl295
[ Post Reply | Private Reply | To 8 | View Replies]

To: Qiviut

Bookmark


15 posted on 06/20/2016 9:15:26 PM PDT by Qiviut (In Islam you have to die for Allah. The God I worship died for me. [Franklin Graham])
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
> For your ping list as a warning...

Good Lord. Thank you!

16 posted on 06/20/2016 9:20:01 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Bump for later


17 posted on 06/20/2016 9:21:35 PM PDT by RightGeek (FUBO and the donkey you rode in on)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
JavaScript Ransomware -- trouble ahead! ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Swordmaker for the ping!!

18 posted on 06/20/2016 9:22:06 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: arl295

Windows Script Host is enabled by default in Windows.

Shut it down. If you do mistakenly open a .js attachment it can’t execute.

Few people need to run javascript outside a browser and there is no real reason to send someone a legitimate .js attachment.

Ransomware authors are looking for new vulnerabilities to take a computer and its data hostage.

.js execution is ideal because an infected file doesn’t need user permission to run and antivirus or antimalware software usually doesn’t detect it.

Make it a habit not to allow unknown file extensions to execute in the first place.


19 posted on 06/20/2016 10:17:42 PM PDT by goldstategop ((In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever))
[ Post Reply | Private Reply | To 13 | View Replies]

To: goldstategop

Simple reg key fix. Took me all of two minutes, including a restart for “good luck”.


20 posted on 06/20/2016 11:17:01 PM PDT by Company Man (Keep on Trumpin')
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-47 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson