{"id":8249,"date":"2017-07-06T15:10:08","date_gmt":"2017-07-06T23:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2023\/"},"modified":"2017-07-06T15:10:08","modified_gmt":"2017-07-06T23:10:08","slug":"news-2023","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2023\/","title":{"rendered":"Report: Second quarter dominated by ransomware outbreaks"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 19:06:53 +0000<\/strong><\/p>\n<p>The second quarter of 2017 brought ransomware to unprecedented levels with worldwide outbreaks that went almost out of control. In scenarios reminiscent of yesteryears worms, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/how-did-wannacry-ransomworm-spread\/?utm_source=blog&amp;utm_medium=social\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry<\/a> created global panic as it used a critical vulnerability in the SMBv1 protocol to propagate like wildfire.<\/p>\n<p>Within hours, hundreds of thousands of machines in over 150 countries were infected and as investigations into the attacks went on, it was discovered that other threat actors had also been leveraging the leaked government-created exploits.<\/p>\n<p>Ransomware continued to be\u00a0the most distributed type of malware, topping 70% of all threats in June with the likes of Cerber, Troldesh, and Jaff. Interestingly, we witnessed other payloads delivered\u00a0alongside ransomware, infecting users with Cerber, Kovter, Nymain, and Boaxxee all at once.<\/p>\n<p>In this report, we will provide a quick update on the ransomware that does not want to die off, namely Locky and also review the latest outbreak with the rebranded <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/07\/all-this-eternalpetya-stuff-makes-me-wannacry\/?utm_source=blog&amp;utm_medium=social\" target=\"_blank\" rel=\"noopener noreferrer\">Petya<\/a> that wreaked havoc in the Ukraine and affected several multinational companies.<\/p>\n<p>With all this ransomware buzz, we can&#8217;t forget about the &#8220;other threats&#8221; which, as a matter of fact, were also somewhat influenced by the aforementioned events. Malvertising was the major engine behind drive-by download attacks that leveraged various exploit kits, most notably RIG EK, Magnitude EK and Astrum EK.<\/p>\n<p>We noted new and somewhat unexpected tech support scam campaigns, with for instance the use of spam and fake Amazon notifications. Typically those come with malicious attachments but in this instance, they contained\u00a0links that ultimately locked up the user&#8217;s browser and urged to dial the so-called Microsoft technicians.<\/p>\n<p>Finally, this report wouldn&#8217;t be complete without our usual Researcher Spotlight section, featuring Jean-Philippe &#8216;Tinfoil Hat&#8217; Taggart.<\/p>\n<h2 style=\"text-align: center\"><a href=\"https:\/\/www.malwarebytes.com\/pdf\/white-papers\/CybercrimeTacticsAndTechniques-Q2-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Download full report here<\/a><\/h2>\n<p>Thanks for reading and safe surfing!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/07\/report-second-quarter-dominated-by-ransomware-outbreaks\/\">Report: Second quarter dominated by ransomware outbreaks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/07\/report-second-quarter-dominated-by-ransomware-outbreaks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 19:06:53 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/07\/report-second-quarter-dominated-by-ransomware-outbreaks\/' title='Report: Second quarter dominated by ransomware outbreaks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/04\/MB_LABS-01.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The second quarter of 2017 left the security world wondering, \u201cWhat the hell happened?\u201d With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adam-kujawa\/\" rel=\"tag\">adam kujawa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adam-mcneil\/\" rel=\"tag\">Adam McNeil<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon-phishing\/\" rel=\"tag\">Amazon Phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/armando-orozco\/\" rel=\"tag\">Armando Orozco<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/astrum\/\" rel=\"tag\">astrum<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/boaxxee\/\" rel=\"tag\">boaxxee<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/breach\/\" rel=\"tag\">breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/breaches\/\" rel=\"tag\">breaches<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cerber\/\" rel=\"tag\">cerber<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime-tactics-techniques\/\" rel=\"tag\">cybercrime tactics &amp; techniques<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime-tactics-and-techniques\/\" rel=\"tag\">cybercrime tactics and techniques<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dok\/\" rel=\"tag\">dok<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/doublepulsar\/\" rel=\"tag\">DoublePulsar<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalblue\/\" rel=\"tag\">EternalBlue<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalpetya\/\" rel=\"tag\">EternalPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/findzip\/\" rel=\"tag\">Findzip<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fireball\/\" rel=\"tag\">fireball<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/handbrake\/\" rel=\"tag\">handbrake<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jaff\/\" rel=\"tag\">Jaff<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jean-philippe-taggart\/\" rel=\"tag\">Jean-Philippe Taggart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jerome-segura\/\" rel=\"tag\">Jerome Segura<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kovter\/\" rel=\"tag\">kovter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky\/\" rel=\"tag\">Locky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magnitude\/\" rel=\"tag\">Magnitude<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes\/\" rel=\"tag\">Malwarebytes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-labs\/\" rel=\"tag\">malwarebytes labs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/marcelo-rivero\/\" rel=\"tag\">Marcelo Rivero<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nathan-collier\/\" rel=\"tag\">Nathan Collier<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/notpetya\/\" rel=\"tag\">NotPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa\/\" rel=\"tag\">NSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nymain\/\" rel=\"tag\">nymain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/petya\/\" rel=\"tag\">petya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-artnz\/\" rel=\"tag\">Pieter Artnz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/proton\/\" rel=\"tag\">proton<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/proton-rat\/\" rel=\"tag\">proton RAT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/q2-2017\/\" rel=\"tag\">Q2 2017<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/second-quarter\/\" rel=\"tag\">second quarter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shadowbrokers\/\" rel=\"tag\">ShadowBrokers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tamy-stewart\/\" rel=\"tag\">Tamy Stewart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/thomas-reed\/\" rel=\"tag\">Thomas Reed<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/troldesh\/\" rel=\"tag\">Troldesh<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wdfload\/\" rel=\"tag\">WDFLoad<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/william-tsing\/\" rel=\"tag\">William Tsing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/07\/report-second-quarter-dominated-by-ransomware-outbreaks\/' title='Report: Second quarter dominated by ransomware outbreaks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/07\/report-second-quarter-dominated-by-ransomware-outbreaks\/\">Report: Second quarter dominated by ransomware outbreaks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,12566,12924,10468,12925,12926,12908,12927,11510,12928,10905,12929,11969,12930,12318,10527,12319,12849,10534,11450,12558,12931,12225,12932,12933,10878,10795,7871,10560,11530,10546,12934,12935,12830,10626,12936,12823,12937,12190,12938,12939,11589,12940,11932,12941,10577,12942,11341,12252,12943,12944],"class_list":["post-8249","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-adam-kujawa","tag-adam-mcneil","tag-adware","tag-amazon-phishing","tag-armando-orozco","tag-astrum","tag-boaxxee","tag-breach","tag-breaches","tag-cerber","tag-cybercrime-tactics-techniques","tag-cybercrime-tactics-and-techniques","tag-dok","tag-doublepulsar","tag-ek","tag-eternalblue","tag-eternalpetya","tag-exploit-kit","tag-findzip","tag-fireball","tag-handbrake","tag-jaff","tag-jean-philippe-taggart","tag-jerome-segura","tag-kovter","tag-locky","tag-magnitude","tag-malwarebytes","tag-malwarebytes-labs","tag-malwarebytes-news","tag-marcelo-rivero","tag-nathan-collier","tag-notpetya","tag-nsa","tag-nymain","tag-petya","tag-pieter-artnz","tag-proton","tag-proton-rat","tag-q2-2017","tag-rig","tag-second-quarter","tag-shadowbrokers","tag-tamy-stewart","tag-tech-support-scams","tag-thomas-reed","tag-troldesh","tag-wannacry","tag-wdfload","tag-william-tsing"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8249"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8249\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}