<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>CryptXXX and SoakSoak are huge threats individually.</p> <!--more--> <p>Reported by <a href="https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler" target="_blank">ProofPoint</a> in April 2016, CryptXXX has transformed (several times) in its way of action and distribution. At first, it was reported to be distributed through use of the Angler Exploit Kit, having anti-analysis functions to avoid exposure. This Ransomware not only encrypts files on the infected node, it also has a function of information disclosure. In a later <a href="https://www.proofpoint.com/us/threat-insight/post/cryptxxx-ransomware-learns-samba-other-new-tricks-with-version3100" target="_blank">version</a>, it was discovered to be capable of finding shared resources on the network and encrypting them. More information can be found in our <a href="https://blog.threatstop.com/2016/07/07/cryptxxx-ransomware-is-rapidly-gaining-momentum">previous </a>blog on this malware.</p> <p>SoakSoak is a malware that targets vulnerabilities in a WordPress plug-in, leading to infection of the vulnerable website. As reported in December 2014, this malware has infected over 100,000 WordPress-based sites.</p> <p>The collaboration of these two threats was initially <a href="https://www.invincea.com/2016/07/major-websites-getting-soaksoakd-delivering-cryptxxx-ransomware/" target="_blank">reported</a> by Invincea, displaying their course of action. The SoakSoak botnet has the capability to scan domains and modify infected sites to redirect to the site hosting Neutrino EK. (which delivers the CryptXXX ransomware)</p> <p>First and foremost, we recommend avoiding the vulnerable WordPress plug-in, Resilver.</p> Both ThreatSTOP IP Firewall Service and DNS Firewall Service customers are protected from CryptXXX &nbsp;if they enable the TS Critical and TSRansomware targets in their policies.</span>