Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM
Connect Directly

Angler Climbing To Top Of Exploit Heap

Exploit kit dominates the field, making up 82 percent of all exploit kits currently used.

A new report out by Sophos shows that in a post-Blackhole exploit kit world, Angler is gaining ground as a favorite attack tool among cybercriminals.

"Since the demise of the Blackhole exploit kit in October 2013, when its alleged operators were arrested, other exploit kits have certainly flourished and shared the marketplace, but Angler has begun to dominate," Fraser Howard, principal virus researcher for SophosLabs, said in the report, which took a deep dive into the growth of the kit and the intricacies of its mechanisms.

Though first hitting the scene in 2013, it wasn't until mid-2014 that Angler really hit its stride. Sophos found that in the period from September 2014 to May 2015, Angler grew from making up less than 23 percent of exploit kits used by criminals to over 82 percent. Just in May alone, Sophos reports that it found thousands of new web pages "booby-trapped with Angler."

There are a number of factors that have placed Angler a cut above the typical exploit kit. Like its peers, Angler thrives off of numerous means to trick user traffic to hit infected sites. But it doesn't just rely on the typical iFrame injection. For example, it uses domain generation algorithms (DGAs) to help do site redirects in a stealthy manner.

"To evade reputation filtering it switches hostnames and IP numbers rapidly, as well as using domain shadowing to piggyback on legitimate domains," Howard writes. "The idea is that the domain name changes every day, but the malicious script does not need to contain a long list of future names."

At every level, Angler has got some evasion trickery built into the kit, Howard says. For example, to evade content detection, components used in Angler are dynamically generated for each victim, using encoding and encryption techniques. Additionally, Angler landing pages have employed a number of different obfuscation techniques, including anti-sandbox checks and a number of tricky ways of encoding scripts.

"For the past year or so, Angler has been encoding its main script functionality as data strings stored in the parent HTML," Howard says. "This content is then retrieved and decoded when the landing page is loaded by the browser."

All of this stacks up to a malware kit that is more successful at sending traffic to infected sites for drive-by downloads and more persistent once machines have been infected. But other black market business factors could be at play as well.

"Angler has risen above its competitors in recent months," postulates Howard. "This could be down to many factors: higher traffic to Angler-infected pages; exploits with a better hit-rate in delivering malware; slicker marketing amongst the criminal fraternity; more attractive pricing – in other words, good returns for the criminals who are buying 'pay-per-install' malware services from the team behind Angler."


Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...