Exploit kit

From HandWiki - Reading time: 4 min

Short description: Collection of security exploit tools


An exploit kit is a tool used for automatically managing and deploying exploits against a target computer. Exploit kits allow attackers to deliver malware without having advanced knowledge of the exploits being used. Browser exploits are typically used, although they may also include exploits targeting common software, such as Adobe Reader, or the operating system itself. Most kits are written in PHP.[1]

Exploit kits are often sold on the black market, both as standalone kits, and as a service.

History

Some of the first exploit kits were WebAttacker and MPack, both created in 2006. They were sold on black markets, enabling attackers to use exploits without advanced knowledge of computer security.[2][3]

The Blackhole exploit kit was released in 2010, and could either be purchased outright, or rented for a fee.[4] Malwarebytes stated that Blackhole was the primary method of delivering malware in 2012 and much of 2013.[5] After the arrest of the authors in late 2013, use of the kit sharply declined.[5][6][7]

Neutrino was first detected in 2012,[8] and was used in a number of ransomware campaigns. It exploited vulnerabilities in Adobe Reader, the Java Runtime Environment, and Adobe Flash.[9] Following a joint-operation between Cisco Talos and GoDaddy to disrupt a Neutrino malvertising campaign,[10] the authors stopped selling the kit, deciding to only provide support and updates to previous clients. Despite this, development of the kit continued, and new exploits were added.[11] As of April 2017, Neutrino activity ceased.[12] On June 15, 2017, F-Secure tweeted "R.I.P. Neutrino exploit kit. We'll miss you (not)." with a graph showing the complete decline of Neutrino detections.[13]

From 2017 onwards, the usage of exploit kits has dwindled. There are a number of factors which may have caused this, including arrests of cybercriminals, improvements in security making exploitation harder, and cybercriminals turning to other method of malware delivery, such as Microsoft Office macros and social engineering.[14]

There are many systems that work to protect against attacks from exploit kits. These include gateway anti-virus, intrusion prevention, and anti-spyware. There are also ways for subscribers to receive these prevention systems on a continuous basis, which helps them to better defend themselves against attacks.[15]

Overview

Exploitation process

The general process of exploitation by an exploit kit is as follows:

  1. The victim navigates to a website infected by an exploit kit. Links to infected pages can be spread via spam, malvertising, or by compromising legitimate sites.
  2. The victim is redirected to the landing page of the exploit kit.
  3. The exploit kit determines which vulnerabilities are present, and which exploit to deploy against the target.
  4. The exploit is deployed. If successful, a payload of the attacker's choosing (i.e. malware) can then be deployed on the target.[1][16]

Features

Exploit kits employ a variety of evasion techniques to avoid detection. Some of these techniques include obfuscating the code,[17] and using fingerprinting to ensure malicious content is only delivered to likely targets.[18][1]

Modern exploit kits include features such as web interfaces and statistics, tracking the number of visitors and victims.[1]

See also

References

  1. 1.0 1.1 1.2 1.3 Cannell, Joshua (2013-02-11). "Tools of the Trade: Exploit Kits" (in en-US). https://blog.malwarebytes.com/cybercrime/2013/02/tools-of-the-trade-exploit-kits/. 
  2. Chen, Joseph; Li, Brooks. "Evolution of Exploit Kits". Trend Micro. https://documents.trendmicro.com/assets/wp/wp-evolution-of-exploit-kits.pdf. 
  3. "Markets for Cybercrime Tools and Stolen Data". RAND Corporation. 2014. https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf. 
  4. "Blackhole malware exploit kit suspect arrested" (in en-GB). 2013-10-09. https://www.bbc.com/news/technology-24456988. 
  5. 5.0 5.1 Kujawa, Adam (2013-12-04). "Malwarebytes 2013 Threat Report" (in en-US). https://blog.malwarebytes.com/security-world/2013/12/malwarebytes-2013-threat-report/. 
  6. Zorabedian, John (9 October 2013). "Is the Blackhole exploit kit finished?". https://news.sophos.com/en-us/2013/10/09/is-the-blackhole-exploit-kit-finished/. 
  7. Fisher, Dennis. "Blackhole and Cool Exploit Kits Nearly Extinct" (in en). https://threatpost.com/blackhole-and-cool-exploit-kits-nearly-extinct/103034/. 
  8. "Neutrino Exploit kit: A walk-through into the exploit kit's campaigns distributing various ransomware" (in en). https://cyware.com/news/neutrino-exploit-kit-a-walk-through-into-the-exploit-kits-campaigns-distributing-various-ransomware-cb14cdb8. 
  9. "Neutrino" (in en-US). https://blog.malwarebytes.com/threats/neutrino/. 
  10. "Malvertising Campaign Pushing Neutrino Exploit Kit Shut Down" (in en). https://threatpost.com/malvertising-campaign-pushing-neutrino-exploit-kit-shut-down/120322/. 
  11. "Former Major Player Neutrino Exploit Kit Has Gone Dark" (in en-us). https://www.bleepingcomputer.com/news/security/former-major-player-neutrino-exploit-kit-has-gone-dark/. 
  12. Schwartz, Mathew (2017-06-15). "Neutrino Exploit Kit: No Signs of Life" (in en). https://www.bankinfosecurity.com/neutrino-exploit-kit-no-signs-life-a-9999. 
  13. F-Secure [@FSLabs]. "R.I.P. Neutrino exploit kit. We'll miss you (not).". https://twitter.com/FSLabs/status/875275005625597953.  Missing or empty |date= (help)
  14. "Where Have All The Exploit Kits Gone?" (in en). https://threatpost.com/where-have-all-the-exploit-kits-gone/124241/. 
  15. Malecki, Florian (June 2013). "Defending your business from exploit kits" (in en). Computer Fraud & Security 2013 (6): 19–20. doi:10.1016/S1361-3723(13)70056-3. https://linkinghub.elsevier.com/retrieve/pii/S1361372313700563. 
  16. "exploit kit - Definition". Trend Micro. https://www.trendmicro.com/vinfo/us/security/definition/exploit-kit. 
  17. "Exploit Kits Improve Evasion Techniques" (in en-US). 2014-11-12. https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-exploit-kits-improve-evasion-techniques/. 
  18. "Angler Exploit Kit Continues to Evade Detection: Over 90,000 Websites Compromised" (in en-US). 2016-01-11. https://unit42.paloaltonetworks.com/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/. 




Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/Exploit_kit
19 views | Status: cached on August 11 2024 08:27:50
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF