Tools for Amateur and Professional Hacker to Exploit Vulnerabilities

The Russian cybercrime underground provides a wide range of tools for amateur and professional hackers, enabling them to leverage the latest application vulnerabilities to target their victims. In order to exploit vulnerabilities in applications and use them to deliver malware and compromise user endpoints, you don’t have to be a genius or have years of hacking expertise. It’s all available for sale.

Trusteer’s security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that is successful 95 percent of the time, according to the seller, which might be related to the stability of the exploit implementation. According to the post, which appeared on a Russian cybercrime forum, the new exploit targets an Adobe Flash Player vulnerability (CVE_2014_0497). Adobe provided a critical patch for this vulnerability on Feb. 4 after an exploit targeting this vulnerability was already seen in the wild.

By exploiting this vulnerability, an attacker can execute arbitrary code and potentially gain remote control of the affected system. The seller, who calls himself “insomnius,” writes that the exploit is 95 percent successful on Internet Explorer (IE) and Firefox (FF). His post, translated from the original Russian, read: “I am selling source code CVE-2014-0497, it is working ~95 percent on IE and FF. All information about current exploit is in the first post.”

Unfortunately, the seller went dark after posting this message so we were unable to get further details about the offer. It could be because exploits targeting this vulnerability have already been included in exploit kits, thus making them highly accessible; likewise, it could also be because the exploit had already been sold to someone else.

If a Patch Exists, Why Are Cybercrime Exploits Successful?

You are probably wondering, “Why would hackers be interested in an exploit if a patch for the vulnerability already exists? Why can it still be successfully exploited?”

The sad reality is that many user endpoints are not properly patched. IT groups struggle to ensure that patches are deployed on all machines, especially those that travel in and out of the organization. Worse, the applications that are most difficult to patch are common applications like Java, Adobe Acrobat and Flash, which can be found on most user endpoints. Other common applications like Microsoft Word, Excel, Outlook, browsers and even media players all have vulnerabilities that can be exploited. Because it is so difficult to manage patches for all the different applications and versions running within the enterprise, many user machines remain vulnerable. The reality is that 60 percent of the exploits target vulnerabilities that have been known for over 12 months.

The worst are zero-day exploits, which target vulnerabilities that are not publicly known. Since they are unknown, there is no patch available to prevent exploitation. Therefore, zero-day exploits have very high success rate and are very valuable in the underground.

Download Free e-Book: Stopping Zero-Day Exploits For Dummies

More from Software Vulnerabilities

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put a spotlight on this capability and learn more about its potential impact. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used…

Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”

September’s Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. The advisory from Microsoft reads: “An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPsec is enabled, which could enable a remote code execution exploitation on that machine.” Pure remote vulnerabilities usually yield a lot of interest, but even over a month after the patch, no additional information outside of Microsoft’s advisory had been publicly published. From my side, it had been a…

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. While Discord and its related software…