Xtube compromised, exploits lead to Cryptowall infection


Websites hosting adult content are usually the preferred target of cyber criminals as the quick click is predominant there. Such a website, Xtube, has been compromised and is serving exploits leading to all kinds of malware infections, including the infamous Cryptowall. Since Xtube is the 780th most visited website in the U.S. this matter is of great concern.

Flash vulnerability exploited to serve malware

According to Malwarebytes, the website hosts a neutrino exploit kit. In this case, hackers have directly injected the malicious code snippet into the website itself (dynamic injection using rotating domains). There are several redirectors used to navigate to the webpage containing the exploit. In the next step, unpatched Flash plug-ins are exploited and the malware is delivered.

26884181_sRansomware rises again

The file dropped is named Xtube.exe. When run, the malware extracts itself using explorer.exe and svchost.exe processes. It turns out the malware is actually Cryptowall 3.0 which locks the user’s files using an RSA-2048 encryption. As one would expect, after the encryption process, the ransomware demands payment through a tor network address.

Cryptowall and other ransomware variants have been a persistent threat in 2015 and are gradually becoming the favorite tools of cyber criminals worldwide. Since the actions of such threats are difficult to undo, users should always keep regular backups of their valuable files and documents to avoid falling into nasty circumstances.

The administrators or Xtube have been notified of the issue, and hopefully it will be resolved soon.

Emsisoft Enterprise Security + EDR

Robust and proven endpoint security solution for organizations of all sizes. Start free trial

Have a nice (exploit-free) day!

Senan Conrad

Senan Conrad

Senan specializes in giving readers insight into the constantly and rapidly changing world of cybersecurity. When he’s not tapping away at his keyboard, he enjoys drinking a good coffee or tinkering in his workshop.

What to read next