{"id":1912,"date":"2022-02-15T13:20:43","date_gmt":"2022-02-15T20:20:43","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=1912"},"modified":"2022-02-15T13:20:46","modified_gmt":"2022-02-15T20:20:46","slug":"the-internets-latest-mimic","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/15\/the-internets-latest-mimic\/","title":{"rendered":"The Internet&#8217;s Latest Mimic"},"content":{"rendered":"\n<p>Recently, installers claiming to offer users an upgrade to Windows 11 have been appearing, mimicking the appearance of the official Microsoft website, but hidden behind their download buttons is a zip archive of malicious files containing a malware called RedLine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"655\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/redline_01-1024x655.png\" alt=\"\" class=\"wp-image-1913 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/redline_01-1024x655.png 1024w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/redline_01-300x192.png 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/redline_01-768x491.png 768w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/redline_01.png 1136w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/655;\" \/><figcaption>Fake Windows 11 website hosted on windows-upgraded.com. (Source: <a href=\"https:\/\/threatresearch.ext.hp.com\/redline-stealer-disguised-as-a-windows-11-upgrade\/\" data-type=\"URL\" data-id=\"https:\/\/threatresearch.ext.hp.com\/redline-stealer-disguised-as-a-windows-11-upgrade\/\">HP<\/a>)<\/figcaption><\/figure>\n\n\n\n<p>These websites appeared after the recent Microsoft announcement that they were advancing the pace of the rollout of Windows 11\u2019s broad deployment phase due to high demand and an upgrade rate twice what was seen for Windows 10. This suggested that the attackers were anticipating such an announcement to come from Microsoft, and had been lying in wait for a spike in demand for the new version of the OS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-redline\"><strong>What is RedLine?<\/strong><\/h3>\n\n\n\n<p>RedLine, more formally known as RedLine Stealer, is a password grabber that sits in the background and monitors the autocomplete fields of your browsers for data such as passwords, credit card information, and other saved credentials. It is widely available on underground forums, and even offers a monthly subscription for updates. Since initial development, it has also gained the ability to steal cryptocurrency from devices it has infected.<\/p>\n\n\n\n<p>RedLine isn\u2019t exactly new, and has been around since long before these fake Windows installers. The earliest mentions of RedLine were in early 2020, associated with a fake email campaign for the Folding@Home application, which allows users to volunteer processing power for medical research.<\/p>\n\n\n\n<p>According to the <em>Have I Been Pwned<\/em> data breach monitoring service, as of the end of 2021, 441 thousand accounts have been stolen by RedLine, through various phishing campaigns, YouTube scams, and fake websites.<\/p>\n\n\n\n<p>Through monitoring of dark web data market sites such as \u20182easy\u2019, it has been determined that around half of sellers are using RedLine as their information grabbing malware of choice, or as part of a set.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"940\" height=\"606\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/file_zip.jpg\" alt=\"\" class=\"wp-image-1914 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/file_zip.jpg 940w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/file_zip-300x193.jpg 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/file_zip-768x495.jpg 768w\" data-sizes=\"(max-width: 940px) 100vw, 940px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 940px; --smush-placeholder-aspect-ratio: 940\/606;\" \/><figcaption>Purchased RedLine log archive contents. (Source: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/2easy-now-a-significant-dark-web-marketplace-for-stolen-data\/\" data-type=\"URL\" data-id=\"https:\/\/www.bleepingcomputer.com\/news\/security\/2easy-now-a-significant-dark-web-marketplace-for-stolen-data\/\">Bleeping Computer<\/a>)<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"how-can-i-tell-if-i-m-using-a-legitimate-website\"><strong>How can I tell if I\u2019m using a legitimate website?<\/strong><\/h3>\n\n\n\n<p>Given the history of RedLine, as well as the recent appearance of the fake Windows 11 installers, it is likely that more fake sites containing RedLine or other malware like it are on their way.<\/p>\n\n\n\n<p>Some good methods for protecting yourself from fake sites are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Keep an eye out for out of place advertisements. If a website is prioritizing advertisement revenue over the revenue of their software, they probably aren\u2019t actually selling the software in question.<\/li><li>Trust your browser\u2019s instincts. If your browser gives you a warning before you proceed to the site, or tries to stop you from accessing it entirely, it is probably a good idea to listen to it unless you are absolutely sure of the identity of the site you are trying to access.<\/li><li>Do NOT disable your firewall. If the site you are downloading from asks you to disable your firewall to complete the download of the software, stop the download and exit the site. Your firewall is one of your best lines of defence against malware and by disabling it you leave your computer vulnerable.<\/li><li>Be wary of big discounts. If a website is offering data at a huge sale, or even for free, there is probably something going on behind the scenes. If you really want to take up the offer, try to separately verify that the company in question has actually put out the software at a discount.<\/li><\/ul>\n\n\n\n<p>References:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/this-password-stealing-malware-posed-as-a-windows-11-download\/\">https:\/\/www.zdnet.com\/article\/this-password-stealing-malware-posed-as-a-windows-11-download\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-windows-11-upgrade-installers-infect-you-with-redline-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/fake-windows-11-upgrade-installers-infect-you-with-redline-malware\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/have-i-been-pwned-adds-441k-accounts-stolen-by-redline-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/have-i-been-pwned-adds-441k-accounts-stolen-by-redline-malware\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/2easy-now-a-significant-dark-web-marketplace-for-stolen-data\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/2easy-now-a-significant-dark-web-marketplace-for-stolen-data\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.redline_stealer\">https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.redline_stealer<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-11-21h2\">https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-11-21h2<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/new-redline-stealer-distributed-using-coronavirus-themed-email-campaign\">https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/new-redline-stealer-distributed-using-coronavirus-themed-email-campaign<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/threatresearch.ext.hp.com\/redline-stealer-disguised-as-a-windows-11-upgrade\/\">https:\/\/threatresearch.ext.hp.com\/redline-stealer-disguised-as-a-windows-11-upgrade\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.hotbot.com\/blog\/how-to-tell-if-youre-using-a-safe-download-source\/\">https:\/\/www.hotbot.com\/blog\/how-to-tell-if-youre-using-a-safe-download-source\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, installers claiming to offer users an upgrade to Windows 11 have been appearing, mimicking the appearance of the official Microsoft website, but hidden behind their download buttons is a zip archive of malicious files containing a malware called RedLine. These websites appeared after the recent Microsoft announcement that they were advancing the pace of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/15\/the-internets-latest-mimic\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Internet&#8217;s Latest Mimic&#8221;<\/span><\/a><\/p>\n","protected":false},"author":392,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1912","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Matt Groeneveldt","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/matt-groeneveldt\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/392"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=1912"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1912\/revisions"}],"predecessor-version":[{"id":1917,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1912\/revisions\/1917"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=1912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=1912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=1912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}