Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:45 PM
Connect Directly

New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware

Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.

A new attack campaign is using HTML smuggling and data blobs to deliver malware onto victim machines while evading network security solutions including sandboxes and legacy proxies.

This particular attack, dubbed Duri by the Menlo Security researchers who discovered it, was first detected in early July of this year and is currently active. The team identified a user's visit to a website and noticed the subsequent file download was flagged as suspicious and then blocked. Further analysis revealed the file was downloaded through HTML smuggling.

The goal of HTML smuggling is to leverage HTML5/JavaScript features to deliver file downloads. Attackers can deploy the download using Data URLs on the client device, or they can create a JavaScript blob with the correct MIME-type, which results in a download on the target device.

"With Duri, the entire payload is constructed on the client side (browser), so no objects are transferred over the wire for the sandbox to inspect," researchers state in a report. In this case, they say, attackers were seen using the JavaScript blob technique to smuggle malicious files via the browser onto the target's endpoint.

How this unfolds: When a user clicks a link, there are multiple redirections before that person lands on an HTML page hosted at duckdns[.]org. This prompts a JavaScript online, which then initializes data for a blob object from a base64 encoded variable. A .zip file is constructed from the blob object and downloaded onto the endpoint. The user needs to open and execute the .zip file, which contains an MSI file and indicates it's a Microsoft Windows installer.

Researchers note the malware deployed is not a new threat. However, they aren't at a point where they can reveal the malware family and/or who might be behind this attack campaign.

"The malware that Duri downloads is not new," they say. "According to Cisco, it has previously been delivered via Dropbox, but the attackers have now displaced Dropbox with other cloud hosting providers and have blended in the HTML smuggling technique to infect endpoints."

The HTML smuggling technique is also not new or novel, says Krishnan Subramanian, a security researcher at Menlo Labs. This is simply the latest instance of an attack technique that proves effective for increasingly sneaky intruders who want to bypass security products.

"It's not taking advantage of any security weakness or vulnerabilities – that's the premise of this attack," Subramanian explains. "It makes use of the legitimate features of HTTP protocols, specifically HTML5 and JavaScript APIs, to sneak malicious files."

Traditional network security tools, such as proxies, firewalls, and sandboxes, depend on the transfer of objects over the wire to flag malicious activity. A sandbox may be instructed to extract certain file objects objects – for example, .exe or .zip – to be detonated and further analyzed. HTML smuggling allows attackers to bypass the content inspection layers that identify malicious file downloads.

Researchers anticipate attackers will continue to rely on HTML smuggling as they adjust their tactics to bypass security tools, forcing victims to depend on a "detect-and-respond" approach to catch up.

"These types of attacks demonstrate the threat landscape is becoming more and more complex," Subramanian says.


Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.