{"id":367,"date":"2012-10-18T11:42:46","date_gmt":"2012-10-18T17:42:46","guid":{"rendered":"http:\/\/www.goodjobsucking.com\/?p=367"},"modified":"2012-10-18T15:35:07","modified_gmt":"2012-10-18T21:35:07","slug":"fun-with-extortionware-or-curse-you-java","status":"publish","type":"post","link":"http:\/\/www.goodjobsucking.com\/?p=367","title":{"rendered":"Fun with Extortionware, or Curse you, Java!"},"content":{"rendered":"<p>Safety on the internet &#8212; that is, protecting your computer from malware &#8212; used to be as simple as not downloading and running dodgy executable code.\u00a0 Sure, some people were tricked, either via emails from &#8220;friends&#8221; or popups trying really hard to convince them to run a local binary.<\/p>\n<p>Websites that wanted to provide a <em>richer<\/em> experience had a few options:\u00a0 run ActiveX controls in IE &#8212; the notion of letting a binary run because a website told it to seemed stupid even at the time, even with the idea of &#8220;signed&#8221; ActiveX controls, so you&#8217;d know who provided a control.\u00a0 There was Flash, a proprietary binary and scripting language now owned by Adobe, and then there was Java, which ran in its own virtual machine with limited access, which seemed like the saner of all the options.<\/p>\n<div id=\"attachment_369\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.goodjobsucking.com\/wp-content\/uploads\/2012\/10\/extortionware.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-369\" class=\"size-medium wp-image-369\" title=\"FBI Green Dot Extortion Scam\" src=\"http:\/\/www.goodjobsucking.com\/wp-content\/uploads\/2012\/10\/extortionware-300x222.jpg\" alt=\"Ransomware Screen\" width=\"300\" height=\"222\" srcset=\"http:\/\/www.goodjobsucking.com\/wp-content\/uploads\/2012\/10\/extortionware-300x222.jpg 300w, http:\/\/www.goodjobsucking.com\/wp-content\/uploads\/2012\/10\/extortionware.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-369\" class=\"wp-caption-text\">This ransomware screen appeared over pretty much everything<\/p><\/div>\n<p>Recently, I stayed in a hotel where the first thing I did was poke through some of my history, looking for an article I&#8217;d been reading before &#8212; which I located, and about a paragraph in, my screen was entirely replaced with a (fake) FBI warning and a demand to pay a &#8220;release fee&#8221; of $200 to regain control of my computer.\u00a0 This was accompanied by the hotel&#8217;s IP address, and a display window that was apparently supposed to turn on the PC&#8217;s camera and show me in my underwear.<\/p>\n<p>This is known as the &#8220;FBI Green Dot Moneypak&#8221; scam, or the &#8220;FBI Moneypak Virus,&#8221; which actually covers a large family of extortionware &#8212; which is essentially a monetizing payload, like this scam, plus a way to deliver it to your computer.\u00a0 In my case, the delivery mechanism appears to be a Java exploit, triggered by either a malicious ad from a site I&#8217;d visited before (at home we use a proxy that strips out suspicious ads, so it&#8217;s possible it had been there before, but my PC wasn&#8217;t actually infected until I visited the same site from the hotel.)<\/p>\n<p>In my case, the infection was completely missed by malware scanners, which seemed to think that my PC was perfectly fine, and even ad hoc scanners proved relatively useless &#8212; even a few which claimed to be able to detect and remove this (detection is free, removal requires payment) were blissfully unaware that the infection had taken place.\u00a0 Googling wasn&#8217;t a lot of help either, since I was either directed to sites with generic instructions to run whatever scanner they were hocking (none of which worked) or long lists of registry keys to check, none of which appeared to exist on my system.\u00a0 So it was either hiding itself well, or too recent to be picked up by scan-based systems.<\/p>\n<p>At any rate, since it was Windows 7, I was able to &#8220;switch user&#8221; to an Administrator account, and I since I hadn&#8217;t received a request to escalate permissions, chances were relatively good it hadn&#8217;t inserted itself too deeply into my OS.\u00a0 I found two suspicious binaries &#8212; suspicious, because they weren&#8217;t where binaries typically go:\u00a0 in c:\\ProgramData was &#8220;lsass.exe&#8221; and in c:\\Users\\username\\AppData\\Local\\Temp was &#8220;ctfmon.exe.&#8221;\u00a0 Both of these are legitimate Windows binaries that would be run &#8212; lsass.exe, for example, is the Local Security Authority Subsystem Service, a legitimate version pretty much needs to be running or the system will restart, and ctfmon.exe activates the language bar.\u00a0 Since I generally have that turned off, this is pretty suspicious, but even more suspicious is the <em>location<\/em> of these files.\u00a0 Deleting them in safe mode (from an alternative account) cleared the infection, returning control of my PC.\u00a0 The PC complained about not being able to find a few files it wanted to run on startup, but I considered that a good sign.<\/p>\n<p>Meanwhile, I went back to my browser to examine the source of the infection, and surely enough, a Java plugin was enabled &#8212; and since it&#8217;s the <em>only<\/em> thing enabled, it&#8217;s pretty obvious that this was the source of the problem.<\/p>\n<p>If you haven&#8217;t done so already, I&#8217;d recommend disabling your Java plugins (virtually no Internet site uses it any more) and any other plugins which you don&#8217;t actually need.\u00a0 If you do use Flash, which is relatively hard to avoid, at least make sure it&#8217;s up to date.\u00a0 Note that updating the version of Flash doesn&#8217;t necessarily update the plugin version, so check from within your browser, not just by looking at versions in the Control Panel.<\/p>\n<p>Mozilla has a handy URL that actually works across browsers:<\/p>\n<p><a title=\"Plugin Check\" href=\"https:\/\/www.mozilla.org\/en-US\/plugincheck\/\">https:\/\/www.mozilla.org\/en-US\/plugincheck\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Safety on the internet &#8212; that is, protecting your computer from malware &#8212; used to be as simple as not downloading and running dodgy executable code.\u00a0 Sure, some people were tricked, either via emails from &#8220;friends&#8221; or popups trying really hard to convince them to run a local binary. Websites \u2026 <a class=\"continue-reading-link\" href=\"http:\/\/www.goodjobsucking.com\/?p=367\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,2],"tags":[],"_links":{"self":[{"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/posts\/367"}],"collection":[{"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=367"}],"version-history":[{"count":6,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/posts\/367\/revisions"}],"predecessor-version":[{"id":373,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=\/wp\/v2\/posts\/367\/revisions\/373"}],"wp:attachment":[{"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=367"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.goodjobsucking.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}