标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2024-117] 作者: 闲云野鸡 发表于: [2017-07-21] [2017-07-21]被用户:ecawen 修改过
本文共 [866] 位读者顶过
We’ve uncovered a new exploit kit in the wild through a malvertising campaign we’ve dubbed “ProMediads”. We call this new exploit kit Sundown-Pirate, as it’s indeed a bootleg of its precursors and actually named so by its back panel. ProMediads has been active as early as 2016, employing Rig and Sundown exploit kits to deliver malware. Its activities dropped off in mid-February this year, but suddenly welled on June 16 via Rig. However, we noticed that ProMediads eschewed Rig in favor of Sundown-Pirate on June 25. It’s worth noting that Sundown-Pirate is only employed by ProMediads so far. This could mean that it’s yet another private exploit kit, like the similarly styled GreenFlash Sundown exploit kit that was exclusively used by the ShadowGate campaign. Our analysis and monitoring revealed that Sundown-Pirate borrowed code from predecessors Hunter and Terror exploit kits. Its JavaScript obfuscation, however, is similar to Sundown’s. This mishmash of scrounged capabilities is what made us think it’s new. ProMediads’ backend panel further cements its name. Together with researcher kafeine, we saw that ProMediads’ panel has a login prompt with “PirateAds – Avalanche Group” on it.
[出自:jiwo.org]
From botnet/info stealer and PoS malware to ransomware By July 12, the exploit kit’s payload changed to point-of-sale (PoS) malware LockPOS. It’s a knownconspirator of Flokibot’s campaigns, another threat that targets point-of-sale/credit card data. We also found that LockPOS delivered via Sundown-Pirate had cryptocurrency-mining softwareCPUMiner-Multi as an additional payload. We don’t think CPUMiner specifically targets PoS systems; it merely uses LockPOS as a vector or conduit to zombify the infected system for cryptocurrency mining. LockPOS will serve as a hidden backdoor polling its C&C server for additional commands from the bot master. On July 13, Sundown-Pirate started dropping Stampado ransomware (RANSOM_STAMPADO.K).
ProMediads, SmokeLoader, and Flokibot/LockPOS: No Prey, No Pay? kafeine shared that in August 2016, ProMediads’ operators distributed Flokibot before it was sold in underground forums in September 2016. Both the Flokibot campaign and ProMediads currently distribute LockPOS. These connections appear to be influenced by relationships between these cybercriminals—at least as far as their malware are concerned.
Old wine in new bottle?
Fortunately, there is a silver lining. The more vulnerabilities are disclosed, the faster they can be patched. And these exploits are going to be less successful as users and business become more proactive and security-savvy. This has been demonstrated by the recent decline of exploit kits, especially the use of zero-days and relatively new vulnerabilities. Additionally, these exploits won’t work on Chrome and Firefox browsers. Flash content on these browsers are disabled by default, but even if Flash is enabled, their security mechanisms can still deter malicious content—e.g., Firefox’s Web Application Program Interfaces (APIs) and Protected Mode, and Chrome’s Sandbox. The plethora of malware Sundown-Pirate delivers, however, still makes it a credible threat. More than ever, exploit kits highlight the real-life significance of keeping systems updated. Systems and networks that remain vulnerable to security flaws (for which patches have long been available) give bad guys a bigger window of exposure to attack them. Information security and IT/system administrators are also recommended to incorporate additional layers of security to their enterprise’s systems and networks. Firewalls, intrusion detection and prevention systems, virtual patching, URL categorization, and enforcing robust patch management policies are just some of the best practices against attacks that exploit vulnerabilities.
Trend Micro Solutions Exploit kits take advantage of security flaws within system or software, which is why a multilayered approach to security is important—from the gateway, endpoints, networks, and servers. Trend Micro™ OfficeScan™ with XGen™ endpoint security has Vulnerability Protection that shields endpoints from identified and unknown vulnerability exploits even before patches are even deployed. Trend Micro’s endpoint solutions such as Trend Micro™ Smart Protection Suites, andWorry-Free™ Business Security protect end users and businesses from these threats by detecting and blocking malicious files and all related malicious URLs.
Indicators of Compromise (IoCs): Domain/IP address related to Sundown-Pirate:
SmokeLoader C&C Domains:
LockPOS C&C Domain:
Domain related to ProMediads:
Related Hashes (SHA-256):
|