Operations

6/7/2016
09:25 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Angler Malware Cheats Microsoft EMET Security

FireEye spots the bad guys beating Microsoft's zero-day exploit protection tool for the first time -- and spreading ransomware as well.

New exploits discovered in the Angler Exploit Kit crimeware can bypass Microsoft’s vaunted Enhanced Mitigation Experience Toolkit (EMET) and then drop ransomware.

The finding by FireEye is the first time that EMET, Microsoft’s free tool that prevents malware from running on a Windows machine, has been unable to catch real malware. Researchers have hacked at EMET over the years looking for weaknesses—with some success--but until now there had been no real signs of bad guys abusing it.

The new exploits utilize vulnerable versions of the Adobe Flash and Microsoft Silverlight running on Windows 7, so keeping those application up-do-date with patches will prevent attacks on systems with EMET 5.5, the latest version of Microsoft’s tool. EMET is often relied upon to thwart zero-day attacks until patches get rolled out in organizations, so the new Angler feature would render that defense useless, according to FireEye.

“Nobody foresaw this coming,” says Raghav Pande, a research scientist with FireEye. Pande, who works on FireEye product security, says Angler and other malware typically look for EMET and if they find it, shut down and give up on an EMET-protected target. But this new variant “completely changed the dynamic” because it is able to bypass EMET detection, he says.

Microsoft, meanwhile, said this via a spokesperson: “EMET is designed to make it more difficult, expensive, and time-consuming, and therefore less likely, for attackers to exploit a system. With no one tool capable of preventing all attacks, Microsoft’s free security software detects and helps remove malware, including Angler.”

But the new EMET-bypass features in Angler demonstrate a growing sophistication of the malware kit’s developers as as well as their ability to target more security-savvy organizations: EMET is an open-source tool used as an extra layer by more advanced security teams.

“EMET is a great tool great tool to provide additional security to a system. Base security should be patching, which will neuter the attack in an even earlier stage. I have to say I am very impressed with the Angler engineering team: earlier this year, the 0-days, [and] now EMET bypass. This means they are targeting well-run organizations,” says Wolfgang Kandek, CTO of Qualys.

FireEye’s Pande says FireEye first spotted code in Angler for bypassing EMET back in March, but it’s now officially operational. The researchers didn’t witness any actual attacks, but were able to test the malware.

Bromium Labs in 2014 demonstrated how it could bypass several key defenses in EMET 4.1, specifically cheating EMET’s stack pivot protection and Export Address Table Filtering features by disabling them. Microsoft later that week released EMET 5.0, which hardened EAF and added Attack Surface Reduction, where organizations can selectively enable Flash, Java, and other third-party plugins.

Angler doesn’t use ROP to evade Data Execution Prevention; instead, it exploits Flash and Silverlight flaws.

In FireEye’s test of the malware, it saw that the exploit shellcode runs TeslaCrypt ransomware when infecting files. And “the attacker has full control over shellcode and it can pretty much execute anything it wants without EMET doing anything,” FireEye said in a new blog post with technical details and screenshots of the new Angler feature in action on Windows 7.

Pande says it’s possible the attack will work on Windows 8 machines as well, but FireEye has only tested Windows 7. Windows 10 would be immune due to the operating system’s ability to control app installation, he says.

Meanwhile, the new Angler features demonstrate just how far its creators have come. “If you compare past years’ attacks," Angler was rebundling exploits, Pande says. "It seemed they didn’t have the guys to tinker or play around with the exploit that much ... Right now, we’re seeing a change in the internal code and structure” of Angler, however, he says.

Patching Flash, Web browsers, and Java, can mitigate the EMET bypass, as can disabling Flash and Silverlight browser plug-ins, according to FireEye.

Michael Gorelik, vice president of R&D at Morphisec, says the Angler attack basically makes half of Windows users "defenseless" to ransomware. "The Angler Exploit Kit is already the preferred weapon of hackers to deliver their malware, and we predict that with this vulnerability, the prominence of Angler will further increase. This time the payload was TeslaCrypt Ransomware, but there is no limitation to what payload can be delivered," he says.

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12480
PUBLISHED: 2018-11-15
Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3.
CVE-2015-9274
PUBLISHED: 2018-11-15
HarfBuzz before 1.0.4 allows remote attackers to cause a denial of service (invalid read of two bytes and application crash) because of GPOS and GSUB table mishandling, related to hb-ot-layout-gpos-table.hh, hb-ot-layout-gsub-table.hh, and hb-ot-layout-gsubgpos-private.hh.
CVE-2018-19286
PUBLISHED: 2018-11-15
The server in mubu note 2018-11-11 has XSS by configuring an account with a crafted name value (along with an arbitrary username value), and then creating and sharing a note.
CVE-2018-19287
PUBLISHED: 2018-11-15
XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter.
CVE-2018-19288
PUBLISHED: 2018-11-15
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.