XSS Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/xss/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Thu, 28 Dec 2023 22:04:37 +0000 en-US hourly 1 https://wordpress.org/?v=70607 200474804 Sierra AirLink Vulnerabilities Expose Critical Infrastructure https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/ https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/#respond Wed, 06 Dec 2023 16:00:03 +0000 https://gridinsoft.com/blogs/?p=18200 The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote code injection, unauthenticated access, DoS attacks, and else. As such network devices are commonly used in industrial manufacturing and applications the like, the impact of such attacks may be rather serious. Sierra AirLink Routers Have… Continue reading Sierra AirLink Vulnerabilities Expose Critical Infrastructure

The post Sierra AirLink Vulnerabilities Expose Critical Infrastructure appeared first on Gridinsoft Blog.

]]>
The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote code injection, unauthenticated access, DoS attacks, and else. As such network devices are commonly used in industrial manufacturing and applications the like, the impact of such attacks may be rather serious.

Sierra AirLink Routers Have 21 Vulnerabilities

As Forescout Vedere researchers describe in their research, the AirLink lineup of devices contains 21 software vulnerabilities. Among them, only one issue got the CVSS score over 9, which is considered critical. RCE vulnerabilities and a couple of ones that may allow for unauthorized access are rated 8.1 to 8.8. Several other noteworthy issues, particularly ones that cause Denial of Service, are rated at CVSS 7.5.

Vulnerability Description CVSS Score
CVE-2023-41101 RCE vulnerability in OpenNDS 9.6 (Critical)
CVE-2023-38316 RCE vulnerability in OpenNDS 8.8
CVE-2023-40461 XSS vulnerability in ACEmanager 8.1
CVE-2023-40464 Unauthorized Access in ALEOS firmware 8.1
CVE-2023-40463 Unauthorized Access in ALEOS firmware 8.1

Researchers did a detailed description of the potential exploitation cases for two of the most critical vulnerabilities. For CVE-2023-41101, a hacker can take over the router by overflowing the buffer in OpenNDS captive portal. Using the lack of length limitation in GET requests, it is possible to make the router execute arbitrary code. By controlling the router, adversaries can disrupt the operations related to the mentioned interface.

CVE-2023-41101 exploitation

#2 in the list, CVE-2023-40463, requires an attacker to possess a router similar to the one it tries to attack. By digging through the device’s software elements and applying some hash cracking magic, it is possible to obtain the diagnostic shell password. Further, using a bit of social engineering, adversaries may connect to the actual router and enter its diagnostic interface using the password they’ve obtained earlier. With such access, it is possible to inject malware to the router, force it to malfunction, or execute your commands remotely.

Available Mitigations

Despite such a worrying amount of exploits, all of them allegedly receive a fix in the latest version of the firmware for AirLink devices. ALEOS 4.17.0 should address all the flaws, and, if some incompatibilities are in the way, customers may stick to version 4.9.9. The latter is not vulnerable to named vulnerabilities except for ones that touch OpenNDS captive portals.

Researchers who found all the issues also offer their own mitigation for the vulnerabilities that allow delaying the patch installation. Though, as it usually happens to all the stopgap solutions, they are not ideal and do not guarantee the effect.

  1. Disable unused captive portals and related services, or put them under restricted access. This reduces the attack surface for vulnerabilities that target OpenNDS.
  2. Use a web app firewall to filter the requests and block the packets of a suspicious source. This mitigation works against XSS and DoS vulnerabilities.
  3. Change the default SSL certificates. Forescout recommends doing this to all the routers, not only to Sierra Wireless ones.
  4. Implement an intrusion detection system that monitors IoT/OT devices as well. This allows for controlling both connections from outside the network and ones within it.

What are Sierra AirLink Routers?

Have you ever wondered, how does the Wi-Fi in a public transport function? Or how all the machinery in a huge workshop is connected and centrally managed even though it is not static? Well, Sierra’s devices are the answer. Their routers are industrial-grade wireless connectivity devices that are used in dozens of industries – starting from public transportation and all the way up to aerospace & defense.

Sierra Airlink stats by countries

What is particularly concerning for this story is the extensive use of AirLink routers in critical infrastructure. Factories, transportation – they are important, though not as continuously demanded as water treatment, emergency services and energy management. And since IoT more and more often attracts hackers’ attention, the actions should be taken immediately. Considering the extensive use of vulnerable AirLink devices in the US, it may be the perfect Achilles’ heel for cyberattacks that target critical infrastructure and even government.

The post Sierra AirLink Vulnerabilities Expose Critical Infrastructure appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/feed/ 0 18200
Web Application Firewall: Difference Blocklist and Allowlist WAFs https://gridinsoft.com/blogs/web-application-firewall-explained/ https://gridinsoft.com/blogs/web-application-firewall-explained/#respond Tue, 10 Jan 2023 18:21:16 +0000 https://gridinsoft.com/blogs/?p=13104 You may have come across a Web Application Firewall (WAF) concept but have yet to give it much thought. However, it is essential to understand what a WAF is to decide if it is right for you. Now we will take a closer look at web application firewalls and give you a definition, explain their… Continue reading Web Application Firewall: Difference Blocklist and Allowlist WAFs

The post Web Application Firewall: Difference Blocklist and Allowlist WAFs appeared first on Gridinsoft Blog.

]]>
You may have come across a Web Application Firewall (WAF) concept but have yet to give it much thought. However, it is essential to understand what a WAF is to decide if it is right for you. Now we will take a closer look at web application firewalls and give you a definition, explain their benefits, and the different types available.

What is a Web Application Firewall (WAF)?

The WAF or web application firewall is a tool that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It can be cross-site scripting (XSS), cross-site spoofing, file inclusion, and SQL injections. WAF is a Layer 7 protection (in the OSI model) and is not designed to protect against all attacks. Instead, it is an attack mitigation method typically part of a set of tools that create a holistic defense against a range of attack vectors.

How Does Web Application Firewall Work?

WAF works using a set of rules, often called policies. These policies aim to protect against application vulnerabilities by filtering malicious traffic. The value of a WAF comes from the speed and ease of implementing policy modifications, which allows you to respond more quickly to different attack directions. So you can modify WAF policies during a DDoS attack and quickly implement rate limiting. In addition, it prevents incoming attacks by analyzing incoming network traffic to the web server/web application according to rules and policies. According to recommendations, WAF should be able to detect types of attacks on the OWASP list:

  • SQL injection
  • Cross-site scripting
  • Command injection
  • Local file inclusion
  • Enabling remote file
  • Buffer overflow, brute force attacks
  • Parameter tampering and file upload vulnerabilities.
  • Poisoning
  • Session hijacking
  • Sensitive data leakage
  • Improper server configuration
  • Commonly known vulnerabilities
  • Manipulation of forms and hidden fields
  • Cookie session

Web app firewall

When a WAF is deploying in front of a web application, a screen is placed between the web application and the Internet, meaning the WAF acts as a reverse proxy server, protecting the application from unwanted requests before they reach the web application.

WAF deployment options

You can deploy WAF in some ways – it all depends on where your applications are deployed, what services you need, how you want to manage them, and the architectural flexibility and performance level you require. For example, do you want to work it yourself, or do you want to outsource that management? Is it better to have a cloud-based option, or do you want your WAF to be hosted locally? How you want to deploy will help determine which WAF suits you. Below are your choices, each with its advantages and disadvantages:

Network-based WAF

Network WAF is a hardware solution installed local network, so it has low latency. The network-based WAF has a WAF engine that handles traffic in proxy mode. All incoming (and outgoing) traffic goes through it and is inspected, and dangerous traffic is blocked. However, this option requires storage and maintenance of physical equipment despite its effectiveness. As a result, it is typically associated with high maintenance costs, making it one of the most expensive deployment options. But its flexibility and ability to control every element makes it attention-worthy.

Network-based WAF

Host-based WAF

Host-based WAF provides protection through software installed on the web server itself. Like the previous option, host-based WAFs are in place and thus minimize latency. However, host-based WAFs consume web server resources to perform their security function because they do not reside on a separate physical device, unlike the previous variant. Thus, host-based WAFs can also be costly because of the need to optimize the web server so that its performance is not degraded by deploying it on the server itself.

Host-based WAF

Cloud-based WAF

Cloud-based WAFs are the most affordable option and are very easy to implement. Companies that provide this service offer a turnkey installation that is as simple as changing DNS to redirect traffic. In addition, cloud WAFs have minimal upfront costs because the service is subscription-based, and users pay a monthly or annual security fee as a service. Cloud WAF security is continually updated to protect against the latest threats without any action or expense on the user’s part. The only disadvantage of a cloud WAF is that users delegate responsibility to a third party so that some WAF features can be a black box for them.

Types of web application firewalls

As described above, a WAF works according to a set of rules or policies defined by the network administrator. Each WAF policy or practice is designed to address a threat or known vulnerability at the application level. Together, these policies allow malicious traffic to be detected and isolated before it reaches the user or application. There are three types of security models used for Web application firewalls:

Positive Security Model

A positive security model identifies what is allowed and rejects everything else, moving away from the “blocked” end of the spectrum, following the “allow only what I know” methodology. The positive security model only trusts allowed requests or inputs and rejects the rest. In this case, an allowlist is created, permission statements are added to the firewall with packet filtering, and allowed inputs or requests are considered based on it.

Negative Security Model

The negative security model is the exact opposite of the positive security model and assumes that:

  • Most web traffic is benign.
  • Web traffic that is not benign can be identified.
WAF models
The higher the variability of the content, the easier it is to define the policy using the negative security model. As the complexity of known content increases, it is easier to describe what is not allowed than what is permitted. Conversely, the opposite effect holds for the positive model; the more varied the site’s content, the more effort it takes to identify those allowed elements.

The negative security model allows all HTTP/S requests by default. Requests are not rejected unless they are identified as hostile. The negative security model is sometimes called the “blacklist” model. This is because you need to blocklist unwanted traffic and define threat signatures and other means of identifying malicious traffic before that traffic can be blocked.

Mixed Security Model

As the name suggests, the mixed security model uses allowlists and blocklists. Since the model combines the advantages of both models, it is the most common. So, most modern firewalls use this model.

Difference Between Blocklist and Allowlist WAFs

The WAF, which operates on a blocklist, protects against known attacks. Let’s compare it to a club bouncer who denies entry to guests who don’t conform to the dress code. The WAF, based on an allowlist, in turn, allows only pre-approved traffic. It’s like a bouncer at an exclusive party who lets in only those on the guest list. Since both options have advantages and disadvantages, many WAFs offer a hybrid security model that implements both.

Difference Between Blocklist and Allowlist WAFs

Why is it essential to use the web application firewall

Protecting corporate data and services is the first and most compelling reason to implement WAF. Thousands of businesses, from minor to giant corporations, make money using the Internet. If this income source is compromised, the company risks being hit hard. Here are the main risks:

Loss of Direct Revenue. Suppose the firm uses an Internet resource for online commerce, which has become unavailable. In this case, customers can not make purchases, and the firm loses a significant amount of money.

Loss of Customer Confidence. A good reputation is essential for a self-respecting company. Many customers pay attention to news about break-ins of specific companies and make a note to themselves so that they do not do business with this company in the future.

Loss of Sensitive Data. Unfortunately, cases where hackers have gained access to sensitive information, are not uncommon. After hacking websites, information such as names, addresses, credit card numbers, medical records, and social security numbers will most likely find their way into the Darknet (and sometimes into the public domain). In addition, private information, trade secrets, and even classified government data are tidbits for hackers. While the mere fact of being hacked is already a nuisance, the fines and disaster recovery/forensic costs can exceed any other financial impact.

The post Web Application Firewall: Difference Blocklist and Allowlist WAFs appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/web-application-firewall-explained/feed/ 0 13104
Hackers Stole over $2.5 million from Hackers https://gridinsoft.com/blogs/hackers-stole-from-hackers/ https://gridinsoft.com/blogs/hackers-stole-from-hackers/#respond Mon, 12 Dec 2022 17:36:36 +0000 https://gridinsoft.com/blogs/?p=12560 In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums alone (Exploit, XSS and BreachForums), according to Sophos researchers. You might also be interested in reading All About Hacker Motivation: Why Do Hackers Hack? Experts spoke about the results of studying darknet forums during a… Continue reading Hackers Stole over $2.5 million from Hackers

The post Hackers Stole over $2.5 million from Hackers appeared first on Gridinsoft Blog.

]]>

In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums alone (Exploit, XSS and BreachForums), according to Sophos researchers.

You might also be interested in reading All About Hacker Motivation: Why Do Hackers Hack?

Experts spoke about the results of studying darknet forums during a report at the Black Hat Europe conference, and then the study was published on the company’s blog.

We observed referral scams, fake data leaks and tools, typesquatting, phishing, alt rep scam (using sockpuppets to artificially inflate reputation), fake sponsors, blackmail, accounts impersonating others, and malware with backdoors. We have even seen instances of attackers taking revenge on scammers who had previously scammed them.say the researchers.

Fraud on the three hack forums that were studied turned out to be so widespread that there are special “arbitrage rooms” on all resources.

Hackers stole from hackers

For example, the Exploit forum has 2,500 scam messages and has a separate section for filing complaints, as well as a blacklist where cases of confirmed fraudulent activities are recorded.

In turn, 760 cases of fraud are reported on XSS, and the forum maintains a “list of rippers” with fraudulent sites.

Hackers stole from hackers

There is a lot more scam on Exploit, both in terms of the number of scam reports and in terms of money lost by participants. This forum has about twice as many users as XSS, and is more attractive to scammers simply because of its reputation.Sophos analysts say.

Thus, Exploit’s “arbitration room” contains 211 complaints totaling $1,021,998, while the blacklist includes 236 incidents that cost other criminals $863,324. For example, in one case, an Exploit user filed a complaint trying to negotiate with the operators of the Conti ransomware to decrypt company data. However, forum administrators have closed this statement as ransomware is not allowed on Exploit.

The media also wrote that Neutrino Botnet Seizes Web Shells of Other Hackers.

Meanwhile, XSS, by comparison, has 120 complaints totaling $509,901, while BreachForums, which has only been in existence since April this year, already has 21 complaints worth $143,722.

Read also: 6 Popular Types of Hackers: Protection Tips in 2022.

While most of the scams that criminals complain about involve five- and six-figure amounts, some victims open claims for much smaller losses (there are cases where the amount of damage is as low as $2).

Hackers stole from hackers

Cybercriminals, like everyone else, seem to be outraged that their money was stolen, and this is not a big deal.the researchers write.

The report notes that such proceedings on hack forums often end in mutual insults and complete chaos, when the accuser accuses the defendant of fraud. In some cases, the intended victims themselves are blocked altogether.

While a ban is the most common punishment for cheating, BreachForums also practices doxing, posting the banned users’ email address, registration details, and the last IP address from which they accessed the forum.

Hackers stole from hackers

Despite this, Sophos lists several cases “involving serial scammers” who were blocked from hack forums, but then simply created new profiles, paid a registration fee and continued to deceive their “colleagues”.

The post Hackers Stole over $2.5 million from Hackers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/hackers-stole-from-hackers/feed/ 0 12560
CSRF vs. XSS: What are Their Similarity and Differences https://gridinsoft.com/blogs/csrf-vs-xss/ https://gridinsoft.com/blogs/csrf-vs-xss/#respond Mon, 20 Jun 2022 13:36:35 +0000 https://gridinsoft.com/blogs/?p=8691 CSRF and XSS: Definition Cross-Site Request Forgery (CSRF) is an attack aimed at vulnerability in computer security, which is one of the biggest problems for user information and accounts because it all makes so that the web browser performs undesirable actions in the application and thereby harms the user who has already logged in to… Continue reading CSRF vs. XSS: What are Their Similarity and Differences

The post CSRF vs. XSS: What are Their Similarity and Differences appeared first on Gridinsoft Blog.

]]>
CSRF and XSS: Definition

Cross-Site Request Forgery (CSRF) is an attack aimed at vulnerability in computer security, which is one of the biggest problems for user information and accounts because it all makes so that the web browser performs undesirable actions in the application and thereby harms the user who has already logged in to the system. A successful attack can result in unauthorized money transfers, data theft, change of passwords, and damage to customer relations.

Cross-site scripting (XSS) is a Web security vulnerability through which an attacker separates Web sites, thereby jeopardizing user interaction with the application. But to avoid being seen by the attacker, one should avoid the same policies of origin.

Work Algorithm of CSRF and XSS

Cross-Site Request Forgery (CSRF) attack
What is a Cross-Site Request Forgery (CSRF) attack?

Cross-Site Request Forgery (CSRF)

CSRF attacks often use social engineering to make a successful attack. Unfortunately, the app cannot distinguish between a legitimate request and a fake one, as the user is already authenticated during the attack. For the attack to be successful, the attacker uses three main keys, which we present below:

  • Relevant action: Any action with user data.
  • Cookie-based session handling: This key includes sending one or more HTTP requests, and the application uses only cookies to identify the user.
  • No unpredictable request parameters: To prevent an attacker from knowing or guessing the value of a query, the query does not contain any parameters.
Cross-site scripting (XSS) algoritm
Cross-site scripting (XSS) algoritm

Cross-site scripting (XSS)

To make this attack, the attacker uses two stages:

  • Before launching the malicious code into the victim’s browser, the attacker is looking for a way to embed malicious code into the web page visited by the user.
  • If the attacker sends malicious code to a specific victim, he does it by phishing or social engineering. Once the malicious code is embedded in the web browser, the victim must visit this infected website.

What is the Difference Between XSS and CSRF?

If we already know the meaning and how XSS and CSRF work, then let’s consider the difference between them:

  1. XSS – allows an attacker to perform any actions in the user’s browser he wants to attack. CSRF – in this case, the attacker takes all the ways to make the user himself perform actions that he did not intend to do.
  2. XSS – a successful exploit of this vulnerability can do everything to ensure that the user performs any action, regardless of the vulnerability’s functionality. CSRF – often applies only to those actions that the user can perform.
  3. XSS is a two-way vulnerability. This means that a script that an attacker has implemented can read answers, exfiltrate data into an external domain, and issue arbitrary queries. CSRF – but this vulnerability is called one-sided because the attacker can do everything to make the user execute the HTTP request, but he cannot get an answer to it.

Can CSRF tokens prevent XSS attacks?

If you use effective CSRF tokens, you can prevent XSS attacks.Assume that the server still validates the CSRF token correctly, in which case the token may prevent an XSS vulnerability. If we think carefully about the name “intersite scripting”, we can understand that it hides a hint that we can see the intersite query in the reflected form. The application prevents the trivial use of an XSS vulnerability, thereby preventing an attacker from faking an intersite request. Here are some important caveats:

  1. The existence of an assumed mirrored, tokenless XSS vulnerability, somewhere within a function, can be used in the usual way.
  2. If a CSRF token protects actions, they can still be performed by the user, with an XSS vulnerability somewhere there that could be exploited. In such a case, the attacker’s script may request the corresponding page to obtain a valid token. He can then use the token to perform any protected action.
  3. If XSS vulnerabilities are already stored, CSRF tokens cannot protect them. You can only use the page that is the output point of the stored XSS vulnerability protected by the CSRF token. At the same time, the XSS payload will be performed when the user visits the page.

The post CSRF vs. XSS: What are Their Similarity and Differences appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/csrf-vs-xss/feed/ 0 8691
About 30% of critical vulnerabilities in WordPress plugins remain unpatched https://gridinsoft.com/blogs/critical-vulnerabilities-in-wordpress-plugins/ https://gridinsoft.com/blogs/critical-vulnerabilities-in-wordpress-plugins/#respond Wed, 16 Mar 2022 11:36:36 +0000 https://gridinsoft.com/blogs/?p=7164 Patchstack analysts have released a report on security and critical vulnerabilities in WordPress in 2021. Unfortunately, the picture turned out to be depressing, for example, it turned out that 29% of critical errors in WordPress plugins did not receive patches at all. In addition, the number of reported vulnerabilities has increased by 150% over the… Continue reading About 30% of critical vulnerabilities in WordPress plugins remain unpatched

The post About 30% of critical vulnerabilities in WordPress plugins remain unpatched appeared first on Gridinsoft Blog.

]]>
Patchstack analysts have released a report on security and critical vulnerabilities in WordPress in 2021.

Unfortunately, the picture turned out to be depressing, for example, it turned out that 29% of critical errors in WordPress plugins did not receive patches at all. In addition, the number of reported vulnerabilities has increased by 150% over the past year.

The researchers write that all this is alarming, since WordPress is the most popular CMS in the world, which is used by 43.2% of all sites in the world.

Of all the bugs that experts reported in 2021, only 0.58% were related to the WordPress core, and the rest were related to different themes and plugins for the platform from different developers. At the same time, 91.38% of vulnerabilities were found in free plugins, while paid solutions for WordPress accounted for only 8.62% of the total number of problems, and this says a lot about the procedures for checking and testing code.

Patchstack experts have identified five critical vulnerabilities affecting 55 WordPress themes, with the most serious of these vulnerabilities related to file upload abuse.

critical vulnerabilities in WordPress plugins

As for plugins, 35 critical vulnerabilities were found in them, two of which affected 4,000,000 sites. Although plugin developers mostly fixed these vulnerabilities, nine plugins never received patches and were eventually removed from marketplaces altogether.

critical vulnerabilities in WordPress plugins

PatchStack also notes that XSS vulnerabilities top the list of the most common flaws in WordPress in 2021, followed by “mixed” vulnerabilities, CSRF, SQL injection and arbitrary file uploads.

critical vulnerabilities in WordPress plugins

Overall, in 2021, about 42% of WordPress sites, on average, contained at least one vulnerable component out of 18 installed. Although this number is less than the 23 plugins installed on average on websites in 2020, the problem is now complicated by the fact that 6 out of 18 are already out of date.

The most vulnerable outdated plugins in 2021 are OptinMonster, PublishPress Capabilities, Booster for WooCommerce, and Image Hover Effects Ultimate.

Let me remind you that we also wrote that Hackers create scam e-commerce sites over hacked WordPress sites, and also that KashmirBlack botnet is behind attacks on popular CMS including WordPress, Joomla and Drupal.

The post About 30% of critical vulnerabilities in WordPress plugins remain unpatched appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/critical-vulnerabilities-in-wordpress-plugins/feed/ 0 7164
Hacker XSS Forum Banned Ransomware Ads https://gridinsoft.com/blogs/hacker-xss-forum-banned-ransomware-ads/ https://gridinsoft.com/blogs/hacker-xss-forum-banned-ransomware-ads/#respond Fri, 14 May 2021 16:16:38 +0000 https://blog.gridinsoft.com/?p=5471 The administration of the popular hacker forum XSS (formerly DaMaGeLab) has banned advertising and sale of any ransomware on its pages. Groups like REvil, LockBit, DarkSide, Netwalker, Nefilim, and so on have often used the forum to advertise new customer acquisition. As a result, ransomware affiliate programs, renting such malware and selling lockers are now… Continue reading Hacker XSS Forum Banned Ransomware Ads

The post Hacker XSS Forum Banned Ransomware Ads appeared first on Gridinsoft Blog.

]]>
The administration of the popular hacker forum XSS (formerly DaMaGeLab) has banned advertising and sale of any ransomware on its pages.

Groups like REvil, LockBit, DarkSide, Netwalker, Nefilim, and so on have often used the forum to advertise new customer acquisition.

The main purpose of the DaMaGeLab forum is knowledge. We are a technical forum, we learn, research, share knowledge, write interesting articles. The goal of Ransomware is just to make money. The goals are not the same. No, of course, everyone needs money, but not by the cost of basic aspirations. We are not a market or a marketplace. Degradation on the face. Newbies open up the media, see some crazy virtual millions of dollars that they will never get. They don’t want anything, they don’t learn anything, they don’t code anything, they just don’t even think, the whole essence of coming down to “encrypt – get $”.the XSS administrator writes in his statement.

As a result, ransomware affiliate programs, renting such malware and selling lockers are now prohibited on XSS.

Shortly after this publication, representatives of a number of groups expressed their dissatisfaction with what was happening. For example, a LockBit spokesperson left a comment with just one word: “suddenly”.

XSS Banned Ransomware Ads

The representative of REvil, in turn, writes that the group is leaving the forum altogether and moving to another hacker resource – Exploit[.]in.

XSS Banned Ransomware Ads

I must say that a little earlier, the operators of REvil, which is currently one of the largest ransomware on the market, also announced the upcoming changes in their work. The hackers said they intend to stop advertising their RaaS platform and will continue to work privately, that is, with a small group of well-known and trusted persons.

REvil plans to stop attacking important social sectors, including healthcare, education, and government networks anywhere in the world, as such attacks could draw unwanted attention to the group’s work.operators REvil write.

If one of the clients nevertheless attacks a “forbidden” company or organization, the hackers intend to provide the victims with a free decryption key and then promise to stop working with such a “partner”.

Apparently, everything that happens is directly related to the attention of the special services, which has attracted the DarkSide ransomware, which last week attacked the largest pipeline operator in the United States, Colonial Pipeline. This high-profile incident received attention at the highest level: the other day, US President Joe Biden announced that the US authorities intend to interfere with the work of the hacking group.

As a result, representatives of DarkSide said that they had already lost access to their servers and multimillion-dollar ransoms (although the American authorities, it seems, have not yet taken any action) and announced the termination of work.

It seems that the XSS administration and the REvil operators do not want to be the object of the same scrutiny from law enforcement agencies, and are trying to act proactively.

Let me remind you that earlier I wrote that REvil spokesman boasts that hackers have access to ballistic missile launch systems.

The post Hacker XSS Forum Banned Ransomware Ads appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/hacker-xss-forum-banned-ransomware-ads/feed/ 0 5471
Netherlands police posted warnings on hacker forums https://gridinsoft.com/blogs/netherlands-police-posted-warnings-on-hacker-forums/ https://gridinsoft.com/blogs/netherlands-police-posted-warnings-on-hacker-forums/#respond Thu, 18 Feb 2021 16:45:43 +0000 https://blog.gridinsoft.com/?p=5130 The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of criminal infrastructure in the Netherlands is hopeless.” The messages were published after the successful operation of Operation Ladybird, during which law enforcement agencies from several countries jointly eliminated one of the largest current botnets, Emotet.… Continue reading Netherlands police posted warnings on hacker forums

The post Netherlands police posted warnings on hacker forums appeared first on Gridinsoft Blog.

]]>
The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of criminal infrastructure in the Netherlands is hopeless.”

The messages were published after the successful operation of Operation Ladybird, during which law enforcement agencies from several countries jointly eliminated one of the largest current botnets, Emotet.

The Netherlands Police, along with Ukrainian law enforcement officers, played key roles in the elimination of the botnet. The Netherlands authorities have shut down two of the three main C&C servers located in the country.

Netherlands police posted warnings

So, the authorities of the Netherlands seized two of the three Emotet control servers that were located in the country.

In their messages, law enforcement officers convince participants in hack forums that it is useless to abuse Netherlands hosting providers to host botnets and other criminal activities.

The police have promised that they will continue to seize the infrastructure of the criminals.

Everyone makes mistakes. We are waiting for yours. Hackers that use providers to place their infrastructure, avoid doing it Netherlands.Dutch police warned.

A message was posted on Raid in English, and on XSS, formerly known as DamageLab, in Russian. XSS is a Russian-language forum where cybercriminals can rent malware under a malware-as-a-service scheme. The site is currently very popular with ransomware operators.

Additionally, law enforcement officers attached an informational video to their messages:

It is interesting that the administration of RaidForums did not touch the post of law enforcement officers, although the forum members responded with insults and doubted its authenticity.

At the same time, the Russian-language XSS deleted the message, blocked the Dutch police account and posted a warning in the profile to prevent other forum members from trusting the user.

It should be noted that the Netherlands are really actively fighting cybercrime. For example, the country’s law enforcements are known for eliminating 15 DDoS services in a week; secured the closure of the hosting company KV Solutions BV, whose servers and backend infrastructure were used to host many IoT botnets; the encrypted mobile network Ennetcom has stopped working; and also cracked encrypted messages on a server confiscated from Ennetcom.

Let me also remind you that recently the Ukrainian cyber police arrested the author of uPanel phishing kit.

The post Netherlands police posted warnings on hacker forums appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/netherlands-police-posted-warnings-on-hacker-forums/feed/ 0 5130