• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

JungleSec Ransomware Infiltrates Servers through Unsecured IPMIs

January 8, 2019Simeon Georgiev

JungleSec ransomware first surfaced on the web in the last days of November. However, ransomware removal experts couldn’t discern how this cryptovirological strain infiltrated the targeted devices. However, after inspections of the affected servers, the experts have come to the conclusion that the JungleSec operators used the vulnerabilities of Intelligent Platform Management Interface (IPMI) to infiltrate targeted devices.

What is IPMI?

IPMI is a management interface built-in hardware (embedded on the motherboard or come as an add-on card) to enable organizations to remotely manage their servers. It makes it convenient for organizations that rent servers to handle their digital operations with convenience.

According to the available details, IPMI protocols of the affected devices were unprotected, and thus the operators used this vulnerability to drop the cryptovirological payload. It is worth mentioning that JungleSec can affect every device regardless of its operating system. Its shenanigans are not just limited to Windows. Linux and Mac users with IPMI integration have also been targeted by JungleSec.

According to the ransom note, the attackers warn the users to not use brute-force cracking to decode the encryption. Moreover, they demand 0.3 Bitcoins to provide ransomware removal key. They promise to provide the solution within 24 hours of the ransom payment. It’s still unclear what encryption algorithm lies in the foundation of JungleSec.

The infiltration mechanism of JungleSec clearly indicates that cryptovirological operators are quickly improving and expanding the details of a ransomware script. It also suggests that ransomware removal skill has a dynamic model that keeps on evolving with the threat.

Protection of IMPI

It has been noted that all the affected users were using IPMIs with default passwords, which were easy to brute-force. To secure your IMPIs from JungleSec or any other malware activity, set a long-string combination of alphabets, digits, and symbols as your password.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post The Connection between Internet Blackout and WannaCry Rebound Next post PewDiePie Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.