Researchers begin analyzing Black Hole exploit kit revisions

Robert Westervelt, News Director

Researchers are still working to pick apart the internals of the latest version of the Black Hole exploit kit, which was announced this week by the cybercriminals behind the notorious automated attack tool.

Attack Toolkits

Black Hat 2012: Phoenix, Black Hole toolkits rising in sophistication

Attack toolkits, such as Black Hole and Phoenix, put powerful automation in the hands of less-savvy cybercriminals, and features and capabilities added in recent years have only made these attack platforms more effective and more dangerous.

Black Hole kit fuels drive-by attacks, rogue antivirus declines, Sophos finds

The Black Hole crimeware kit has caused drive-by attacks to surge, according to the Sophos 2012 threat report.

Researchers at Trend Micro Inc. said it is unclear if all of the new features in version 2.0 have been fully released, but an analysis of the latest code detected in the wild found some retooled capabilities. A new URL generation algorithm used to deliver exploits was announced, but Trend said it is seeing both version 1.0 and 2.0 capabilities running concurrently in the code its team analyzed, indicating that testing may be taking place.  

"This unusual combination indicates that the authors of [Black Hole] 2.0 may still be beta-testing specific features before actually releasing [Black Hole] 2.0 fully into the wild," wrote Jon Oliver, the software architecture director at Trend Micro. "We will continue to monitor for new information related to this new threat, and release our findings as appropriate."

Black Hole is notorious for spreading malware, containing exploits that target a variety of vulnerabilities. Common flaws targeted by the toolkit include browser components, such as Flash and Java. The authors of the toolkit also update the kit to those who purchase a license. It recently was updated to exploit a Java zero-day vulnerability, which was patched by Oracle on Aug. 30.  

Researchers at Websense Security Labs said the updates appear to change the URL pattern used to identify the kit and obscure the IP so antivirus fails at detecting its presence on systems. The domain generation algorithm changes make it more difficult to detect Web pages that contain malicious code. The URLs are obfuscated differently, making identification difficult.

"The creator of this kit changes the obfuscation as often as a model changes clothes at a fashion show," wrote Chris Astacio, a researcher at Websense.

New system "written from scratch"
In an English translated message outlining the new capabilities posted to Pastebin, the authors included a number of performance and design improvements. New functionality added to the console enables quick viewing of statistics. Monitoring capabilities have been improved to enable cybercriminals to evaluate the quality of the traffic and performance of exploits.

"Version 2.0 is not a continuation of the old bunch, is a completely new system written entirely from scratch, given the client is going to request for more than two years of operation, version 1," according to the announcement.

View the next item in this Essential Guide: Big data analytics: New patterns emerge for security or view the full guide: Endless variety: Dealing with advanced threats

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: