Exploit Kits "Lacking P(a)unch"
Posted by Ran Mosessco on 17 December 2013 02:00 PM
Criminal groups formerly using the Blackhole exploit kit experiment with the Magnitude exploit kit, social engineering techniques, direct attachments, phishing, and fraud
Over the past two months, the criminal gangs that were using malicious email redirecting to the BlackHole exploit kit have made major changes to their tactics, techniques, and procedures, providing some interesting insights into the financially motivated cyber criminal community. While there has been a considerable amount of discussion about "what is the next big exploit kit?," after the arrest of Blackhole creator Paunch, data from the Websense® ThreatSeeker® Intelligence Cloud (described in detail below) shows that a major criminal group is trending away from Blackhole, and instead experimenting with the up-and-coming Magnitude exploit kit, but not at the volume and frequency we have come to expect from them. In addition, we have observed another major group using Cutwail that appears to have shifted from originally using Blackhole to deliver Pony and ZeuS GameOver malware to focusing increasingly on direct attachments for delivery.
Below is a timeline describing email-based attack trends that we have observed during the recent decline of Blackhole
One of the most prolific botnets in existence, Cutwail, at one time had the capacity to produce up to 46% of global spam (according to research reports). Cutwail is commonly used by criminal groups to distribute spam targeting the financial industry via malware capable of stealing banking credentials and credit card numbers. Historically, malicious email sent from the Cutwail botnet has contained a mixture of URLs and ZIP attachments with executables.The intent of Cutwail campaigns is typically to focus on stealing banking credentials and credit card numbers, the email typically impersonate popular banks and financial institutions, major social networks, news organizations, and online retail sites. URL links contained in these email have typically redirected to the Blackhole exploit kit, which deliver downloaders for malware (with ZeuS GameOver variants being the majority). A second approach uses malicious ZIP attachments in Cutwail email that contains executables that eventually download ZeuS GameOver variants. However, this approach is not as technically sophisticated as the previous technique of a URL leading to the Blackhole exploit kit that does not require a user to "double-click" an executable to infect their computer.
In early October 2013, Paunch, the proprietor of the infamous Black Hole exploit kit, was arrested by Russian authorities which affected the business model of a few cyber criminal gangs. In the wake of Paunch's arrest, there has been quite a bit of discussion about the future of Blackhole and competitive exploit kits. Security researcher Kafeine has a detailed analysis of the different gangs that were using Black Hole and their activities before and after the arrest.
A shift in tactics
According to Websense telemetry, it appears that since Paunch's arrest in October 2013, the focus of large-scale malicious email campaigns sent via Cutwail has shifted to using attachments, with a short fling using the up-and-coming Magnitude exploit kit seen in October and November (/news/ gang), phishing campaign in December (/topic/ gang).
The data above is generated from one of the Websense real-time analytics that detects Cutwail spam bot campaigns. The analytic operates both in our honeypot and production environments, and outputs both the total number of email that it detects (containing both malicious links and ZIP attachments), and the subset of email containing attachments (ZIP mostly). While this particular real-time analytic captures only a sample of the Cutwail SPAM that we block, the breakdown of SPAM email with attachments with our real-time analytics to detect exploit kits illustrates a clear trend, initially moving away from Blackhole after Paunch's arrest, experimenting with Magnitude but at lower volume than before, and then moving almost entirely to direct email attachments. It is important to remember that more than one criminal group is using Cutwail. We differentiate gangs based on their malware delivery techniques and targets.
Why the shift?
It is important to remember that cyber criminals are financially motivated. The business arrangements between the criminal gangs and Paunch were lucrative, and it may be the case that Magnitude's business model or effectiveness (most likely measured by infection rate) did not justify the cost for the gang ("/news/" or "ru:8080 gang") that experimented with it, to go full bore as we have seen in their earlier campaigns. Another surprising conclusion could be that the "/topic/" or "Zeus GameOver" gang have seen that direct attachments to email are still effective, and they have decided to invest their resources in other areas.
Similarly, use of existing attack infrastructure for redirection to phishing pages or to less sophisticated malware download sites can be the criminals' way of experimenting with new techniques until a good working relationship is established with the people behind one or more of the existing (or upcoming) exploit kits.
Incidentally, we have seen that some of the ZeuS variants that are delivered through attachments, such as the Upatre downlader, continue to download other malware. Given enough time to run on a victim machine, Upatre sometimes downloaded ransomware such as CryptoLocker, which may have been generating increased revenue for criminal gangs, even with lower infection rates after the decline of Blackhole.
We predict that in the next months, there will be a return to URL-based email attacks utilizing exploit kits that offer "malware as a service" on a larger scale. The use of exploit kits is simply a more effective delivery mechanism—especially with an increasingly security-aware target audience.
Read more »
Fox News-themed Malicious Email Campaign [UPDATED]
Posted by Jason Hill on 28 June 2013 02:53 PM
Websense® Security Labs™ researchers, using our Websense ThreatSeeker® Intelligence Cloud, discovered an interesting malicious email campaign using spoofed email addresses from Fox News domains in an attempt to ultimately lure victims to websites hosting the Blackhole Exploit Kit. Should the exploit and compromise be successful, a malicious payload related to the Cridex family appears to be delivered which, as detailed in an earlier Websense Security Labs blog, is typically used to steal banking credentials as well as the exfiltration of personally identifiable information (PII) and other confidential data for criminal gain. These emails, discovered early on the morning of June 27th, featured “breaking news” subjects and mimicked legitimate news content related to the US Military moving into Syria in order to entice the victim to 'click' on the malicious links. The campaign appears to have targeted a variety of industries and countries, as of 1600 PST on June 27th, the Websense ThreatSeeker® Intelligence Cloud had detected and blocked over 60,000 samples.
Once executed, a number of HTTP connections on port 8080 are opened in order to download additional malicious payloads:
Malicious domain (hxxp://sartorilaw.net)
Tuesday, July 2, 2013:
Websense Labs, via our ThreatSeeker Intelligence Cloud, have identified a modification to this campaign; using Pinterest as it's platform, the update informs the recipient their Pinterest account is in need of updating and suggests they follow a link to do so - clicking on this link results in action which is identical to the Fox News campaign, mentioned in the initial blog.
As always, Websense keeps it's users safe through the7 stages of Advanced Threats, via our Advanced Classification Engine.
Read more »