What security measures can be taken to stop crimeware kits?

Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains.

What defensive measures have been put in place to stop the sale of crimeware kits like MPack? How big of a threat are they to the enterprise?
MPack is a nasty piece of work. Written by a group of Russian developers, MPack is modular PHP code that bad guys place on compromised Web servers. When users surf to an MPack'ed server, their browsers are pummeled with a barrage of client-side exploits that try to install bots, keystroke loggers, rootkits and other malware on the unsuspecting victims' machines.

The MPack developers sell their creation, which they keep up to date with the latest exploits, to a series of organized crime groups, and they do so for about $1,000 per toolkit. In July 2007, SecurityFocus posted a pretty spooky interview with the MPack developers, known as the "Dream Coders Team," in which they describe their business model and practices. In August 2007, MPack developers were implicated in an attack against the Bank...

of India's Web site, which compromised and served up 22 different exploits to unsuspecting surfers.

These types of crimeware tools are a significant threat to the enterprise, because they represent a major vector by which malware propagates today. Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar tools. Once the bad guys have control of an internal enterprise network's machines, they can steal sensitive information, resulting in significant damages to an organization's profits and reputation.

From a defensive measure, there's not a lot that law enforcement can do to prevent the sale of this code. First off, most of the code is developed overseas, in countries where law enforcement lacks the resources to stop, or even track, such transactions. Furthermore, in many countries, the sale of such code isn't a crime in and of itself.

Thus, our best defense against these exploit-distributing attacks is to keep our Web servers hardened. The Center for Internet Security features downloadable hardening guides, many specific types of Web servers. Furthermore, clients must be patched thoroughly – especially browsers and third-party client software -- to minimize the chance of exploitation. Check out my recent tip that describes methods for patching third-party applications on Windows systems.

More information:

  • Yuval Ben Itzak talks about the growing use of crimeware kits.
  • The sale of crimeware kits is skyrocketing, according to a report issued by security vendor Symantec Corp.
  • This was first published in February 2008

    Dig Deeper on Emerging Information Security Threats



    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.



    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: