{"id":360,"date":"2016-01-23T14:34:20","date_gmt":"2016-01-23T21:34:20","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=360"},"modified":"2016-01-23T14:34:20","modified_gmt":"2016-01-23T21:34:20","slug":"when-url-shorteners-and-ransomware-collide","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/when-url-shorteners-and-ransomware-collide\/","title":{"rendered":"When URL Shorteners and Ransomware Collide"},"content":{"rendered":"<h1>When URL Shorteners and Ransomware Collide<\/h1>\n<blockquote><p>We are all very familiar with <a href=\"https:\/\/en.wikipedia.org\/wiki\/URL_shortening\" target=\"_blank\" rel=\"noopener\">URL shortening services<\/a>, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to malicious destinations.<\/p>\n<p>Recently, a URL shortening\u00a0service was used to shrink\u00a0a dubious\u00a0link, obfuscating a malicious destination:<\/p>\n<p>46(dot)30(dot)45(dot)39\/Statement.jpg<\/p>\n<p>which was actually a malicious script dowloader \u201cStatement.js\u201d, dropping\u00a0Cryptowall from<\/p>\n<p>46(dot)30(dot)45(dot)39\/yyo.w<\/p>\n<p>Cryptowall is Ransomware which\u00a0encrypts files on your computer and demands that a ransom be paid in order\u00a0to receive instructions (private key) for decrypting your files (in this case, RSA-2048 encryption was used).<\/p>\n<p>&lt;&#8230;&gt;<\/p>\n<p>There are precautions that can be taken to avoid clicking on a malicious shortened link, such as not clicking on a shortened link if you do not know who it is from. If you want to take additional\u00a0measures, there are services that unshorten shortened URL\u2019s such as<\/p>\n<p>checkshorturl(dot)com<\/p>\n<p>Furthermore, it is highly recommended that you use anti-virus and anti-malware in conjunction for the best possible protection. Malwarebytes Anti-Malware protects users from this attack, including\u00a0blocking identified malicious IPs and domains associated with Ransomware.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.org\/security-threat\/2016\/01\/when-url-shorteners-and-ransomware-collide\/?utm_source=double-opt-in&amp;utm_medium=email-internal-b2c&amp;utm_campaign=EM-Jan2016_B2Cnewsletter&amp;utm_content=ransomwarecollide\" target=\"_blank\" rel=\"noopener\">Read More&#8230;<\/a><\/p><\/blockquote>\n<p>Source: \u00a0<a href=\"https:\/\/blog.malwarebytes.org\/security-threat\/2016\/01\/when-url-shorteners-and-ransomware-collide\/?utm_source=double-opt-in&amp;utm_medium=email-internal-b2c&amp;utm_campaign=EM-Jan2016_B2Cnewsletter&amp;utm_content=ransomwarecollide\" target=\"_blank\" rel=\"noopener\">When URL Shorteners and Ransomware Collide | Malwarebytes Labs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When URL Shorteners and Ransomware Collide We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-general-and-non-specific-topics"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}