• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Hermes ransomware infects South Koreans via Flash player update

March 17, 2018Simeon Georgiev

In the very first days of January 2018, the South Korean Emergency Response Team (KrCERT) published a detail report of how a supposedly botchy Flash Player update was being used in several targeted attacks on many of the country’s state agencies’ servers. The flaw they identified was in correspondence to the Flash Player Update 28.0.0.137. The report had further evidence that the ransomware which attaches itself with the Update spreads through Office documents being opened and shared via email attachments. The reason for this is because the Word documents constitute nearly 70% of the correspondence between several South Korean government agencies per day.

Only a week after the report, spam campaigns had begun targeting South Korean civilians. It is believed that these are not the same attackers that had used the Flash Player update to try and penetrate the state agencies. Rather, another group that is merely using the same technique. The use of spam campaigns to increase the distribution of ransomware files is nothing new but the news that a Flash update is being used to gain easier access certainly came as a surprised to authorities.

The technique being used in this instance is probably through an exploitation kit called GreenFlash Sundown. It merges the Flash update definitions with the Hermes ransomware and is sent to users in the form of a spam message made to look like the offer of a Flash update. A similar technique was used in an attack on a Taiwanese bank believed to have been carried out by a North Korean group. They utilized the same exploitation kit and attached it to an Office update.

The first civilian report of being affected by this virus came on 28th February 2018. By 13th of March, the number of people complaining of having been the victims of a similar attack rose to thousands. Authorities have revealed that they have been able to identify the redirection code within the update’s JavaScript libraries. The code redirects the network to an OpenX server. The server then compromises the main page’s source code and begins encrypting the computer. The encoding used in this ransomware attack is RC4.

For assistance with file recovery and Hermes ransomware removal, please contact MonsterCloud – cyber security experts for a professional ransomware removal.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware attack on the state court system Next post US sanctions Russia over NotPetya, election meddling and energy grid hacks

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.