This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
3. - Emerging defenses: Read more in this section
- Defending against large-scale DDoS attacks
- Mobile devices and network intrusions
- Defending yourself in a malware toolkit world
- Malware toolkits: A veritable black hole
- Where does big data fit when dealing with emerging threats?
Explore other sections in this guide:
Researchers are still working to pick apart the internals of the latest version of the Black Hole exploit kit, which was announced this week by the cybercriminals behind the notorious automated attack tool.
Attack toolkits, such as Black Hole and Phoenix, put powerful automation in the hands of less-savvy cybercriminals, and features and capabilities added in recent years have only made these attack platforms more effective and more dangerous.
The Black Hole crimeware kit has caused drive-by attacks to surge, according to the Sophos 2012 threat report.
Researchers at Trend Micro Inc. said it is unclear if all of the new features in version 2.0 have been fully released, but an analysis of the latest code detected in the wild found some retooled capabilities. A new URL generation algorithm used to deliver exploits was announced, but Trend said it is seeing both version 1.0 and 2.0 capabilities running concurrently in the code its team analyzed, indicating that testing may be taking place.
"This unusual combination indicates that the authors of [Black Hole] 2.0 may still be beta-testing specific features before actually releasing [Black Hole] 2.0 fully into the wild," wrote Jon Oliver, the software architecture director at Trend Micro. "We will continue to monitor for new information related to this new threat, and release our findings as appropriate."
Black Hole is notorious for spreading malware, containing exploits that target a variety of vulnerabilities. Common flaws targeted by the toolkit include browser components, such as Flash and Java. The authors of the toolkit also update the kit to those who purchase a license. It recently was updated to exploit a Java zero-day vulnerability, which was patched by Oracle on Aug. 30.
Researchers at Websense Security Labs said the updates appear to change the URL pattern used to identify the kit and obscure the IP so antivirus fails at detecting its presence on systems. The domain generation algorithm changes make it more difficult to detect Web pages that contain malicious code. The URLs are obfuscated differently, making identification difficult.
"The creator of this kit changes the obfuscation as often as a model changes clothes at a fashion show," wrote Chris Astacio, a researcher at Websense.
New system "written from scratch"
In an English translated message outlining the new capabilities posted to Pastebin, the authors included a number of performance and design improvements. New functionality added to the console enables quick viewing of statistics. Monitoring capabilities have been improved to enable cybercriminals to evaluate the quality of the traffic and performance of exploits.
"Version 2.0 is not a continuation of the old bunch, is a completely new system written entirely from scratch, given the client is going to request for more than two years of operation, version 1," according to the announcement.