Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Cybercriminals Encrypt Website Databases in “RansomWeb” Attacks

Malicious actors are encrypting website databases and holding them for ransom, Switzerland-based security firm High-Tech Bridge revealed on Wednesday.

File encrypting ransomware has become highly problematic for both regular Internet users and organizations. However, researchers at High-Tech Bridge have spotted a new type of attack that threatens businesses.

Malicious actors are encrypting website databases and holding them for ransom, Switzerland-based security firm High-Tech Bridge revealed on Wednesday.

File encrypting ransomware has become highly problematic for both regular Internet users and organizations. However, researchers at High-Tech Bridge have spotted a new type of attack that threatens businesses.

The technique, dubbed “RansomWeb,” targets sensitive information stored in website databases. These attacks require a lot of patience, but they can be highly profitable for cybercriminals.

The attackers first compromise the targeted company’s Web application. Then, they modify server scripts so that data is encrypted on-the-fly before it’s inserted into the database. This encryption process happens over a long period of time to avoid raising any suspicion. Once the data is encrypted, victims are sent a ransom demand.

In one operation observed by researchers, the attackers encrypted the database of a financial company over a six-month period. During this time, even the backups were overwritten with encrypted entries, making it difficult to recover the data.

In this particular attack, only critical fields in the database were targeted by the cybercriminals, most likely in an effort to reduce the impact on the Web application’s performance.

The encryption key is stored on a remote Web server accessible only via HTTPS. However, once the encryption process is completed, the key is removed from the server.

In a different attack analyzed by High-Tech Bridge, cybercriminals targeted a phpBB forum used by an SMB for customer support. In this case, the attackers encrypted users’ email addresses and passwords on-the-fly between the Web application and the database over a period of two months.

Advertisement. Scroll to continue reading.

The phpBB installation was compromised after the cybercrooks stole an FTP server password. Once they had access to the server, they planted backdoors and encrypted the information.

Researchers believe RansomWeb attacks can be used for both blackmail and for the long-term disruption of a website. These operations are more effective than distributed denial-of-service (DDoS) attacks because the targeted Web application can be disrupted for longer periods of time, High-Tech Bridge said.

Since even the backups are encrypted, and because the attackers ensure that the encryption key is not easy to obtain, it’s very difficult to recover the lost data without paying the ransom.

On the other hand, experts have pointed out that RansomWeb attacks can be easily detected if website administrators deploy file integrity monitoring systems. These types of operations can also be quickly spotted on regularly updated Web applications.

Researchers noted that while it is difficult for cybercriminals to encrypt an entire database without impacting performance or damaging the Web app’s functionality, it’s often enough for the attackers to encrypt one important field in the database.

“We are probably facing a new emerging threat for websites that may outshine defacements and DDoS attacks. RansomWeb attacks may cause unrepairable damage, they are very easy to cause and pretty difficult to prevent,” said Ilia Kolochenko, CEO of High-Tech Bridge. “Days when hackers were attacking websites for glory or fun are over, now financial profit drives them. The era of web blackmailing, racket and chantage is about to start.”

“Cyber blackmailing and ransomware exists since a while already, however websites is a new vector of chantage. We have tens of millions of vulnerable web applications with critical data, and hackers will definitely not miss such a great opportunity to make money on negligent website administrators,” noted Marsel Nizamutdinov, High-Tech Bridge’s chief research officer.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

Matt Hartley has been named Chief Revenue Officer at autonomous security solutions provider Horizon3.ai.

Trustwave has announced the appointment of Keith Ibarguen as Senior Vice President of Engineering.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.