Security researchers at Heimdal Security have found an increase in mutated exploit kits (EK), according to the company’s official blog. The spike has been observed since the beginning of 2016.

Exploit kits showing up on the scans include Neutrino, RIG and Angler. Neutrino, for example, has mutated itself and now spreads ransomware from the Kovter class and the Cryptolocker2 family.

Neutrino Uses Flash Vulnerabilities

This new campaign for Neutrino also comes with new tricks: Google Blackhat SEO-poisoning and using Flash Player vulnerabilities as a distribution vector for ransomware.

According to Heimdal Security and a report in SecurityWeek, this particular campaign involves injecting the malware code into legitimate websites. The website will then redirect a user to a selection of domains that, in turn, are connected to servers controlled by attackers. The payloads that Neutrino pushes are located on these servers, along with other malware.

Smart Exploit Kits

To make matters worse, the payload delivery process now includes a series of tests that can detect whether the browser and Flash Player plugin being used are up to date and whether a debugger is present in memory. Heimdal Security noted that this change was added to the Angler and Nuclear EKs in early November, which was two weeks after Adobe released a patch specifically for the vulnerability.

Virus Total showed that currently, only two out of 38 tools can detect these EK attacks.

More About RIG

The RIG EK is in its third version and is now abusing known vulnerabilities in popular third-party applications such as Adobe Flash, Adobe Reader, Adobe Acrobat and Silverlight to plant malware on outdated Microsoft Windows machines.

It performs drive-by attacks on Google. Heimdal Security said that queries such as Christmas-tree-pull-apart or Capital-one behavioral-fit-interview-questions-3 will give a user results that point to the swarm of compromised websites where the malicious script code has been injected.

The entire server at the IP address 192,185.21 [.] 183 is considered harmful. Besides the drive-by exploit kits, this server also hosts gateways to the command-and-control servers, phishing websites and other malicious content. The delivered payloads vary between one from the Pony family and the TofSee Trojan.

“We have observed that this payload achieves an infection success rate of 56 percent on Windows 7 PCs with Internet Explorer 9,” Heimdal Security’s Andra Zaharia said in the company’s blog. “The security issues lie particularly with Adobe Flash Player and, respectively, with vulnerabilities CVE-2015-5119 and CVE-2015-5122.”

Mediation

The mediation process is simple, really: Update security patches for Flash. Flash has been shown to be very vulnerable in the past. If established fixes have not been applied, then you are begging for trouble.

More from

Increasingly Sophisticated Cyberattacks Target Healthcare

4 min read - It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks.In response to the findings, the American Hospital Association told Porter Research, “Not only are cyber criminals more organized than they were in the past, but they are often more skilled and sophisticated.”Although not unanimous, the majority of…

4 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis.Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last few…

2 min read

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

HHS Releases Hospital Cyber Resiliency Landscape Analysis

4 min read - On April 17, 2023, The U.S. Department of Health and Human Services (HHS) 405(d) Program announced the release of its Hospital Cyber Resiliency Initiative Landscape Analysis. This landmark analysis reports on domestic hospitals’ current state of cybersecurity preparedness. The scope of the HHS study was limited to activities that protect access to patient care and safety and reduce the negative impact of cyber threats on clinical operations. Breaches of sensitive data were considered only if the breach had a direct…

4 min read