Attacks/Breaches

8/3/2015
12:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Web Attacks Employing Upgraded Crimeware Kit Hit 1.5 Million Users

RIG 3.0 used to infect millions of Internet Explorer (IE) users worldwide -- mostly via malvertising.

The RIG crimeware kit got an upgrade and is the tool of choice in a wave of Web attacks worldwide that is infecting around 27,000 victims each day -- some using an exploit leaked in The Hacking Team breach.

Researchers at Trustwave today reported a spike in use of RIG 3.0, a new version of crimeware kit that was recently updated by its author after the source code was dumped online by a disgruntled underground reseller of the tool. Over the past 6 weeks that Trustwave had monitored the attacks, some 1.25 million users were infected, in series of attacks that mostly came via malicious ads on major websites.

Arseny Levin, lead security researcher at Trustwave, says some 3.5 million users visited those infected sites, and 90 percent of the more than 1 million who were infected were via malicious ads. The attacks--carried out by various groups all employing the shiny new version of RIG, which is typically used as an initial attack vector--used three different exploits, including the Hacking Team's Adobe Flash (CVE-2015-5122) zero-day, which black hat hackers were quick to weaponize before users could patch their machines.

Malvertising -- where ads are injected with malware unbeknownst to the website owner where the ad runs -- is hot. According to a new report from RiskIQ today, malvertising increased 260 percent in the first half of this year. And in sync with the latest RIG 3.0-based attacks: the most number one malvertisement lure is fake Flash updates. Even so, RiskIQ found that fake software updates were more common than exploit kits (think RIG) as the means of installing malware on victims' machines.

Some 3,000 Alexa top 3000 websites -- news, investment consulting, IT solutions providers, and others -- were found harboring the malicious RIG 3.0-rigged ads, according to Trustwave.

In addition to the Hacking Team Flash 0day, the malicious ads also employed the Windows OLE Automation Array exploit (CVE-2014-6332) and a VML attack (CVE-2013-2551) -- all of which are Internet Explorer attacks.

The RIG 3.0-rigged ads were used by various "users or customers" of the crimeware kit for their own attack campaigns, Levin says. "Each was installing a different type of malware on a computer" most using malvertising as the initial attack vector, he says.

Victims were IE users without the latest patches, mainly in Brazil (450,000); Vietnam (300,000); Turkey (82,000); India (62,000); and the US (46,000), at last count.

Aside from malvertising, victims with already-infected machines were reinfected via RIG 3.0, and others, visiting a compromised website, according to Levin.

The most prolific RIG 3.0 attacker has hit more than 100,000 machines was spotted paying other hackers for machines that have not been compromised by the kit before. "However, instead he is actually getting re-infected computers which are more challenging because many are locked out due to ransomware or are not useable for other reasons. This means the customer is getting scammed," Levin wrote in a blog post today. "He is paying ten times more than he should for computers that he thinks are clean but in reality, are not. Typically, customers pay about 10 dollars per 100 infections of clean computers. For an already compromised computer, they pay 10 dollars for every 1000 infections."

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/3/2015 | 2:22:21 PM
Adobe Flash
Adobe Flash is a rats nest of vulnerabilities. Can anyone offer alternatives to adobe flash that satisfy similar needs?
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.