News Stay informed about the latest enterprise technology news and product updates.

Exploit kit delivered via malvertising targets unpatched systems

A malvertising campaign could put millions at risk of attack as the Stegano exploit kit is being delivered by this new method and is targeting unpatched systems.

Researchers found an older exploit kit being delivered in a new way -- using weaponized graphical images -- that...

could leave millions of users at risk of attack.

ESET researchers said the Stegano exploit kit was found being delivered in a malvertising campaign that has shifted targets to different regions of the world, first seen in the Netherlands, then the Czech Republic and now Canada, Britain, Australia, Spain and Italy. ESET said it has "observed major domains, including news websites visited by millions of people every day, acting as 'referrers' hosting these advertisements." The malvertising is also reportedly very difficult to spot with the naked eye, according to ESET.

"Without requiring any user interaction, the initial script reports information about the victim's machine to the attacker's remote server. Based on server-side logic, the target is then served either a clean image or its almost imperceptibly modified malicious evil twin," ESET researchers wrote in a blog post. "The malicious version of the graphic has a script encoded in its alpha channel, which defines the transparency of each pixel. Since the modification is minor, the final picture's color tone is only slightly different to that of the clean version."

The exploit kit delivered by the malicious ad has been found in the wild since 2014 and under the name Astrum, though ESET calls it Stegano in reference to steganography -- the practice of concealing an image or file within an image.

While the Stegano exploit kit targets the usual suspects of Internet Explorer and the Adobe Flash Player, experts said there were unusual characteristics of the kit.

Allan Liska, senior solutions architect at Recorded Future, the Somerville, Mass. threat intelligence company, said the traffic patterns of the malvertising campaign are as strange as the exploits used.

"It doesn't look like they are targeting specific users. Instead, they have been running campaigns against different countries. So, these are not targeted or watering hole attacks, nor are they mass attacks. The attackers are judicious in picking their victims," Liska told SearchSecurity. "While their infrastructure and delivery systems are sophisticated, it does not appear, based on public reporting, that they are using any zero-day exploits. Instead, they are relying on users having unpatched systems."

Tim Erlin, senior director of IT security and risk strategy at Tripwire, said malvertising ideally should be detected by the ad network, rather than the end user, but end users can protect themselves by keeping software updated.

"As an end user, your best protection is to keep your system and applications up to date and patched. The malicious ads use known vulnerabilities to infect your system, so patching and updates help keep you safe, even if you come across a malicious ad online," Erlin told SearchSecurity. "All malware requires a way to get onto your system, and the most common methods are through known vulnerabilities and phishing."

Darren Spruell, threat researcher at RiskIQ, the San Francisco-based cybersecurity company, said any control that can block script execution from untrusted sites would be effective.

"The malvertising starts with malicious ad placements in the ad ecosystem, and through a chain of redirects ends up at the attackers' exploit kits. At various points along the way, JavaScript executes within the victim's browser. Disrupting this can prevent traffic redirection," Spruell told SearchSecurity. "Ad networks can take various steps to mitigate malvertising from affecting their customers and internet site visitors. An important step is to validate advertisers and following general best practices established within the online advertising industry."

Next Steps

Learn how enterprises can defend against malvertising.

Find out what software is targeted by the most popular exploit kits.

Get info on what enterprises need to consider with automated patching systems.

Dig Deeper on Application attacks (buffer overflows, cross-site scripting)

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What policies does your organization have about the use of Internet Explorer or the Flash Player?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close