Several top-tier domains were victims of a malvertising campaign driven by the Angler Exploit Kit The New York Times, BBC, The Hill, Newsweek, AOL, MSN, and several other top-tier domains had their ad networks hijacked over the weekend by criminals using the Angler Exploit Kit to deliver Ransomware.Researchers at Trend Micro, Malwarebytes, and Trustwave each reported a spike in malicious traffic over the weekend that impacted thousands of websites. It isn’t clear if the upticks were part of a larger coordinated effort. What is clear is that the person(s) driving the campaign knew what they were doing.“This time it seems that an experienced actor has acquired an expired domain of a small but probably legitimate advertising company in order to utilize this for malicious purposes. This provides them with high quality traffic from popular web sites that publish their ads directly, or as affiliates of other ad networks, which our research has shown to lead to the Angler EK,” Trustwave reported.In a post on Monday, Trustwave reported that answers.com and several other high-volume domains were hijacked briefly and used to spread Bedep and TeslaCrypt via the Angler Exploit Kit. Trend Micro reported similar attacks, and noted that since March 9, there has been a noticeable increase in Angler-based activity. It’s possible the attacks impacted tens of thousands of users in under 24-hours.Using an expired domain as part of the campaign is a new twist, but effective given that ad networks usually vet their partners. Often, criminals have to target ad platforms without verification in order to operate, or they’ll hijack existing networks for a brief period. Obtaining access to a recently expired domain adds some legitimacy, and will often help the crooks clear various passive vetting checks.Researchers at Malwarebytes tied two recently registered rogue domains to Angler-based attacks over the weekend at the New York Times, MSN, BBC, AOL, The Hill, Newsweek, NFL.com, the Xfinity customer portal (my.xfinity.com), Realtor.com, and The Weather Channel.“While we didn’t collect the actual malware payload in each of these attacks, chances are quite high that it would be one of the several strains of ransomware currently out there,” Malwarebytes’ Jérôme Segura wrote in a post explaining their observations.Ransomware is quickly becoming the go to payload for criminals because it’s a quick payout with little overhead.Generating new variants of new Ransomware costs the criminal nothing after the initial development fee is paid, and running a campaign costs pennies per victim. Two payments often cover the cost of an entire campaign, and the rest is pure profit.As an attack, Ransomware is also difficult to deal with, because victims are sometimes forced to pay the ransom due to a lack up current or working backups. This is the case for victims at home and the office. Such was the case at Hollywood Presbyterian Medical Center. The hospital had to pay $17,000 to recover from a Ransomware attack that crippled their network fore more than a week. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe