Attacks/Breaches

8/3/2015
12:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Web Attacks Employing Upgraded Crimeware Kit Hit 1.5 Million Users

RIG 3.0 used to infect millions of Internet Explorer (IE) users worldwide -- mostly via malvertising.

The RIG crimeware kit got an upgrade and is the tool of choice in a wave of Web attacks worldwide that is infecting around 27,000 victims each day -- some using an exploit leaked in The Hacking Team breach.

Researchers at Trustwave today reported a spike in use of RIG 3.0, a new version of crimeware kit that was recently updated by its author after the source code was dumped online by a disgruntled underground reseller of the tool. Over the past 6 weeks that Trustwave had monitored the attacks, some 1.25 million users were infected, in series of attacks that mostly came via malicious ads on major websites.

Arseny Levin, lead security researcher at Trustwave, says some 3.5 million users visited those infected sites, and 90 percent of the more than 1 million who were infected were via malicious ads. The attacks--carried out by various groups all employing the shiny new version of RIG, which is typically used as an initial attack vector--used three different exploits, including the Hacking Team's Adobe Flash (CVE-2015-5122) zero-day, which black hat hackers were quick to weaponize before users could patch their machines.

Malvertising -- where ads are injected with malware unbeknownst to the website owner where the ad runs -- is hot. According to a new report from RiskIQ today, malvertising increased 260 percent in the first half of this year. And in sync with the latest RIG 3.0-based attacks: the most number one malvertisement lure is fake Flash updates. Even so, RiskIQ found that fake software updates were more common than exploit kits (think RIG) as the means of installing malware on victims' machines.

Some 3,000 Alexa top 3000 websites -- news, investment consulting, IT solutions providers, and others -- were found harboring the malicious RIG 3.0-rigged ads, according to Trustwave.

In addition to the Hacking Team Flash 0day, the malicious ads also employed the Windows OLE Automation Array exploit (CVE-2014-6332) and a VML attack (CVE-2013-2551) -- all of which are Internet Explorer attacks.

The RIG 3.0-rigged ads were used by various "users or customers" of the crimeware kit for their own attack campaigns, Levin says. "Each was installing a different type of malware on a computer" most using malvertising as the initial attack vector, he says.

Victims were IE users without the latest patches, mainly in Brazil (450,000); Vietnam (300,000); Turkey (82,000); India (62,000); and the US (46,000), at last count.

Aside from malvertising, victims with already-infected machines were reinfected via RIG 3.0, and others, visiting a compromised website, according to Levin.

The most prolific RIG 3.0 attacker has hit more than 100,000 machines was spotted paying other hackers for machines that have not been compromised by the kit before. "However, instead he is actually getting re-infected computers which are more challenging because many are locked out due to ransomware or are not useable for other reasons. This means the customer is getting scammed," Levin wrote in a blog post today. "He is paying ten times more than he should for computers that he thinks are clean but in reality, are not. Typically, customers pay about 10 dollars per 100 infections of clean computers. For an already compromised computer, they pay 10 dollars for every 1000 infections."

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/3/2015 | 2:22:21 PM
Adobe Flash
Adobe Flash is a rats nest of vulnerabilities. Can anyone offer alternatives to adobe flash that satisfy similar needs?
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: That's it, next year we start outsourcing toy production.
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.