{"id":83622,"date":"2016-11-23T18:46:15","date_gmt":"2016-11-23T13:16:15","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=83622"},"modified":"2016-11-24T12:17:34","modified_gmt":"2016-11-24T06:47:34","slug":"alert-fake-flash-player-website-spreading-locky-ransomware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/alert-fake-flash-player-website-spreading-locky-ransomware\/","title":{"rendered":"Alert! A Fake Flash Player Website is Spreading Locky Ransomware"},"content":{"rendered":"<p>The Locky ransomware, like all other ransomware, encrypts user data and demands a hefty ransom in exchange for the key that decrypts the data.<\/p>\n<p>A variant of this ransomware called &#8216;thor&#8217; was recently found being distributed via a fake &#8216;Flash Player Update&#8217; downloading website that goes by the name &#8216;fleshupdate.com&#8217;. The distribution of unwanted software and PUAs through such fake updates has been reported on several other occasions earlier as well. This distribution technique only goes to show how attackers are trying hard to maximize their target area. If you notice, the word \u2018flash\u2019 has been wrongly spelled in the domain name &#8211; &#8216;<em>fl<strong>e<\/strong>shupdate.com&#8217;<\/em>.<\/p>\n<p><strong>What happens when a user visits this fake website?<br \/>\n<\/strong>When a user lands on this website, they are greeted by a fake web page stating &#8216;Your Flash Player may be out of date&#8217;. To a normal, unsuspecting user, this web page will look exactly like the real Adobe site.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83625 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Fake-Flash-Player-web-page.png\" alt=\"fake-flash-player-web-page\" width=\"633\" height=\"376\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Fake-Flash-Player-web-page.png 840w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Fake-Flash-Player-web-page-300x178.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Fake-Flash-Player-web-page-768x456.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Fake-Flash-Player-web-page-789x469.png 789w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1. Fake Flash Player web page<\/p>\n<p>Almost instantly, the fake page gets automatically redirected to a malicious URL (highlighted below), which then begins downloading the Locky ransomware variant on the user\u2019s computer.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-83624 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Malicious-Locky-executable-download-URL.jpg\" alt=\"malicious-locky-executable-download-url\" width=\"879\" height=\"197\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-Locky-executable-download-URL.jpg 879w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-Locky-executable-download-URL-300x67.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-Locky-executable-download-URL-768x172.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-Locky-executable-download-URL-789x177.jpg 789w\" sizes=\"(max-width: 879px) 100vw, 879px\" \/>Fig 2. Malicious Locky executable download URL<\/p>\n<p>The malicious executable file is downloaded with the name &#8216;FlashPlayer.exe&#8217; and carries the icon of the genuine Flash Player to fool the user.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83623 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Malicious-executable-file-with-Flash-Player-icon.jpg\" alt=\"malicious-executable-file-with-flash-player-icon\" width=\"455\" height=\"289\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-executable-file-with-Flash-Player-icon.jpg 568w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Malicious-executable-file-with-Flash-Player-icon-300x191.jpg 300w\" sizes=\"(max-width: 455px) 100vw, 455px\" \/><\/p>\n<p style=\"text-align: center\">Fig 3. Malicious executable file with the Flash Player icon<\/p>\n<p>Noticing the harmless-looking icon, when the unsuspecting user considers this file as a genuine one and runs it, the ransomware starts scanning the infected computer for file types that it supports and encrypts them. The malware adds the &#8216;.thor&#8217; extension to the encrypted files and this is followed by the ransom note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83628 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Encrypted-Files-with-\u2018.thor\u2019-extension.jpg\" alt=\"encrypted-files-with-thor-extension\" width=\"555\" height=\"248\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Encrypted-Files-with-\u2018.thor\u2019-extension.jpg 575w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Encrypted-Files-with-\u2018.thor\u2019-extension-300x134.jpg 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/p>\n<p style=\"text-align: center\">Fig 4. Encrypted files with \u2018.thor\u2019 extension<\/p>\n<p><strong>How Quick Heal helps?<\/strong><\/p>\n<p>Quick Heal\u2019s inbuilt <strong>Browser Protection<\/strong> proactively blocks access to malicious URLs\/websites that can trigger the download of ransomware and other malware on your computer; in this case, it blocked the URL \u2018fleshupdate.com\/dow7878nload\/flashplayer.exe&#8217;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83627 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Browsing-Protection.jpg\" alt=\"browsing-protection\" width=\"424\" height=\"259\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Browsing-Protection.jpg 378w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/11\/Browsing-Protection-300x183.jpg 300w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/>Fig 5. Quick Heal Browsing Protection Alert<\/p>\n<p>Quick Heal proactively detects the malicious component as &#8216;TrojanRansom.Locky&#8217;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83626 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/11\/Quick-Heal-Virus-Protection-Alert.jpg\" alt=\"quick-heal-virus-protection-alert\" width=\"402\" height=\"213\" \/><\/p>\n<p style=\"text-align: center\">Fig 6. Quick Heal Virus Protection Alert<\/p>\n<p><strong>How to stay safe against ransomware attacks<\/strong><\/p>\n<ul>\n<li>Before accessing any website, always verify its URL; look for spelling errors and junk characters.<\/li>\n<\/ul>\n<ul>\n<li>Never click on links or download attachments that arrive in emails from unwanted, unknown or unexpected sources.<\/li>\n<\/ul>\n<ul>\n<li>Apply all recommended security updates (patches) to your Operating System, and programs like Adobe, Java, web browsers, etc.<\/li>\n<\/ul>\n<ul>\n<li>Take regular backups of your files. Remember to disconnect the Internet when you are backing up on a hard drive. Unplug the drive before you go online again.<\/li>\n<\/ul>\n<ul>\n<li>Avoid using outdated browser plugins or plugins that you do not use anymore.<\/li>\n<\/ul>\n<ul>\n<li>Invest in an <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\" target=\"_blank\">antivirus software<\/a> that comes with several layers of security such as Web Security that blocks infected websites, Email Security that blocks infected emails, Phishing Protection that blocks fake and phishing websites, etc.<\/li>\n<\/ul>\n<ul>\n<li>Always keep your antivirus software up-to-date to stay safe against new threats.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>ACKNOWLEDGEMENT<\/strong><\/p>\n<p>Subject Matter Expert &#8211;<\/p>\n<p>Prashil Moon (Threat Research and Response Team)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Locky ransomware, like all other ransomware, encrypts user data and demands a hefty ransom in exchange for the key that decrypts the data. A variant of this ransomware called &#8216;thor&#8217; was recently found being distributed via a fake &#8216;Flash Player Update&#8217; downloading website that goes by the name &#8216;fleshupdate.com&#8217;. The distribution of unwanted software [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":83630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,303,910],"tags":[1373,1374,50],"class_list":["post-83622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-phishing","category-ransomware","tag-fake-flash-update","tag-fake-software","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83622"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=83622"}],"version-history":[{"count":6,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83622\/revisions"}],"predecessor-version":[{"id":83635,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83622\/revisions\/83635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/83630"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=83622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=83622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=83622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}