HackDig : Dig high-quality web security articles for hackers

Exploit kit roundup - early June 2015, (Thu, Jun 4th)

2015-06-09 15:40

Introduction

Security Operation Center (SOC) analysts investigate alerts on suspicious network activity. However, these analysts might not run across exploit kit (EK) traffic that often. An organizations web gateway can stop a great deal of bad traffic before you see a full infection chain. Investigating other types of suspicious activity will likely take up the majority of an analysts workday.

Some of us are lucky enough to review EK traffic on a routine basis. What that in mind, I want to share examples of the most common exploit kits Ive noticed so far this year.

In order, the EK traffic Ive seen most often in 2015 has been:

  • Angler
  • Fiesta
  • Nuclear
  • Neutrino
  • Magnitude
  • Rig

This isnt a comprehensive list. Other exploit kits are out there, but these are most common that Ive seen this year. I dont have any hard numbers, and the last four (Nuclear, Neutrino, Magnitude, and Rig) are more of an educated guess for the ranking. The EK scene can evolve fairly quick. The list will likely change within a few months, and my observations are only one persons view.

Angler EK

Angler is the most common exploit kit I run across. Its also the most advanced. Angler changes URL patterns frequently, and these changes have recently happened on a near-daily basis. Angler started using fileless infection techniques in 2014 [1], and it now sends its payload in a fairly sophisticated encrypted manner (meaning it doesnt use a straight-forward ASCII string to XOR the payload when its sent over HTTP). In recent months, Ive had a hard time obtaining the payload from Angler EK. In the example for this diary, I wasnt able to obtain or decrypt the payload.

Previously, Ive seen Angler sending some form of ransomware like the TeslaCrypt/Alpha Crypt variants [2] or CrytoWall 3.0 [3]. In the past few days, I" />
Shown above: Angler EK traffic and post-infection activity on Wednesday 2015-06-03.

Fiesta EK

Fiesta is probably the next-most common exploit kit Ive run across, most of it related to the BizCN actor that I described in a previous diary [4]. Other actors certainly use this exploit kit. Like Angler EK, Fiesta also uses a more sophisticated type of encryption when sending the malware payload.">Shown above: Fiesta EK traffic on Wednesday 2015-06-03.

Magnitude EK

Magnitude EK often sends several payloads, sometimes 6 or more. Its a very noisy exploit kit. Ill often see CryptoWall 3.0 as one of the payloads. In the example for this diary, Magnitude only sent one payload, and that was CryptoWall 3.0. Ive usually seen Magnitude EK send the malware payloads unencrypted, at least when using IE 8 as a web browser in the vulnerable host. I don">Shown above: Magnitude EK traffic and post-infection activity on Wednesday 2015-06-03.

Neutrino EK

In 2014, this exploit kit disappeared for about six months then came back in a much different form [5]. Traffic patterns have remained relatively unchanged since it reappeared in late 2014. Neutrino EK uses a more sophisticated style of encryption when sending the malware payload (not merely a straight-forward XOR using an ASCII string).

Neutrino however, Sweet Orange seems to have disappeared from the scene back in February of 2015. I havent found any Sweet Orange after February, but Ive seen plenty of Neutrino since then. If you see recent traffic you think is Sweet Orange, double check it. Its probably Neutrino EK.

Neutrino has been relatively consistent over the past few months. Havent seen a lot of it, but it">Shown above: Neutrino EK traffic on Wednesday 2015-06-03.

Nuclear EK

Last year, this exploit kit seemed much more common than it is today. Operation Windigo still uses Nuclear EK [6], but in recent weeks, Ive rarely seen Nuclear outside of that.">Shown above: Nuclear EK traffic and post-infection activity associated with Operation Windigo on Wednesday 2015-06-03.

Rig EK

When Rig first appeared in 2014, it looked remarkably similar to Infinity EK [7] (which was first identified as Goon EK). Rig EK apparently borrowed a great deal from Infinity. While I havent seen Infinity this year, Ive definitely run across Rig every once in a while.

In April 2015, Rig EK changed the encryption it uses for sending the malware payload.">Shown above: Rig EK traffic on Wednesday 2015-06-03.

Final words

As mentioned earlier, this is merely one persons view into the current state of exploit kits. Its not comprehensive, and there are other exploit kits I dont have visibility on. Heres a list of pcap files from the previous paragraphs:

Ive also collected the exploits and malware payloads where I could. A zip file with this collection is available at:

The zip file is password-protected with the standard password. If you dont know it, email admin@malware-traffic-analysis.net and ask.

---
Brad Duncan
ISC Handler and Security Researcher at Rackspace
Blog: www.malware-traffic-analysis.net - Twitter: @malware_traffic

References:

[1] http://malware.dontneedcoffee.com/2014/08/angler-ek-now-capable-of-fileless.html
[2] https://isc.sans.edu/diary/Angler+exploit+kit+pushes+new+variant+of+ransomware/19681
[3] https://isc.sans.edu/diary/Angler+exploit+kit+pushing+CryptoWall+30/19737
[4] https://isc.sans.edu/diary/Actor+using+Fiesta+exploit+kit/19631
[5] https://isc.sans.edu/diary/Exploit+Kit+Evolution+Neutrino/19283
[6] http://www.rackspace.com/blog/in-2015-operation-windigo-is-still-going-strong/
[7] http://www.kahusecurity.com/2014/rig-exploit-pack/
[8] http://malware-traffic-analysis.net/2015/05/06/index2.html

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.


Source: ssr;pma&36791=diyrots?lmth.yraid/ude.snas.csi

Read:4913 | Comments:0 | Tags: exploit

“Exploit kit roundup - early June 2015, (Thu, Jun 4th)”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud