The Angler exploit kit has been in the news a lot lately, with new variants popping up. What are the dangers of...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
this hacking tool and how can they be mitigated on an enterprise level?
The Angler exploit kit is a standard exploit kit that has a modular framework for malware development and to manage the attack lifecycle. It has capabilities for hiding from antimalware detection -- such as making false calls to interact with the system and encrypting the data over the network -- to prevent it from being analyzed.
Angler can include multiple different vulnerabilities in the module depending on the target network and the exploits available; this makes customizing the malware easier and faster to adapt. Once the initial exploit is executed on an endpoint via a drive-by download, the Angler exploit kit runs its payload to infect the system with malware. It also has functionality for tracking which systems have been infected so the malware author can use these systems to send spam or other attacks.
One of the latest variants of the Angler exploit kit targeted three vulnerabilities in Adobe Flash Player.
Enterprises can mitigate the latest Angler risks by disabling Flash or using a network-based tool to block the malware, such as an intrusion prevention system or dedicated antimalware network tool.
Standard security control recommendations around securing endpoints are needed, such as keeping systems updated with the latest patches, securing configurations and using modern antimalware tools.
Not installing Flash on endpoints so they're not exposed to Flash vulnerabilities is also an option, or enterprises could potentially run Flash or Web browsers in a sandbox, making a Flash vulnerability more difficult to exploit.
Enterprise security awareness programs should include policies and information about using caution when opening attachments and clicking on links, but, of course, this goes in hand in hand with leveraging other technical controls.
Ask the Expert:
Want to ask Nick Lewis a question about enterprise threats? Submit your question now via email. (All questions are anonymous.)
Learn how to track and prevent crimeware attacks
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
When NSA cyberweapons went public, attackers bundled them into the EternalRocks malware. Nick Lewis takes a closer look at this new threat and ...continue reading
A Google Docs phishing attack used OAuth tokens to affect more than a million Gmail users. Nick Lewis explains how it happened, and how to defend ...continue reading
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.