Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/18/2020
01:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware

Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.

A new attack campaign is using HTML smuggling and data blobs to deliver malware onto victim machines while evading network security solutions including sandboxes and legacy proxies.

This particular attack, dubbed Duri by the Menlo Security researchers who discovered it, was first detected in early July of this year and is currently active. The team identified a user's visit to a website and noticed the subsequent file download was flagged as suspicious and then blocked. Further analysis revealed the file was downloaded through HTML smuggling.

The goal of HTML smuggling is to leverage HTML5/JavaScript features to deliver file downloads. Attackers can deploy the download using Data URLs on the client device, or they can create a JavaScript blob with the correct MIME-type, which results in a download on the target device.

"With Duri, the entire payload is constructed on the client side (browser), so no objects are transferred over the wire for the sandbox to inspect," researchers state in a report. In this case, they say, attackers were seen using the JavaScript blob technique to smuggle malicious files via the browser onto the target's endpoint.

How this unfolds: When a user clicks a link, there are multiple redirections before that person lands on an HTML page hosted at duckdns[.]org. This prompts a JavaScript online, which then initializes data for a blob object from a base64 encoded variable. A .zip file is constructed from the blob object and downloaded onto the endpoint. The user needs to open and execute the .zip file, which contains an MSI file and indicates it's a Microsoft Windows installer.

Researchers note the malware deployed is not a new threat. However, they aren't at a point where they can reveal the malware family and/or who might be behind this attack campaign.

"The malware that Duri downloads is not new," they say. "According to Cisco, it has previously been delivered via Dropbox, but the attackers have now displaced Dropbox with other cloud hosting providers and have blended in the HTML smuggling technique to infect endpoints."

The HTML smuggling technique is also not new or novel, says Krishnan Subramanian, a security researcher at Menlo Labs. This is simply the latest instance of an attack technique that proves effective for increasingly sneaky intruders who want to bypass security products.

"It's not taking advantage of any security weakness or vulnerabilities – that's the premise of this attack," Subramanian explains. "It makes use of the legitimate features of HTTP protocols, specifically HTML5 and JavaScript APIs, to sneak malicious files."

Traditional network security tools, such as proxies, firewalls, and sandboxes, depend on the transfer of objects over the wire to flag malicious activity. A sandbox may be instructed to extract certain file objects objects – for example, .exe or .zip – to be detonated and further analyzed. HTML smuggling allows attackers to bypass the content inspection layers that identify malicious file downloads.

Researchers anticipate attackers will continue to rely on HTML smuggling as they adjust their tactics to bypass security tools, forcing victims to depend on a "detect-and-respond" approach to catch up.

"These types of attacks demonstrate the threat landscape is becoming more and more complex," Subramanian says.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29043
PUBLISHED: 2021-05-17
The Portal Store module in Liferay Portal 7.0.0 through 7.3.5, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 1 does not obfuscate the S3 store's proxy password, which allows attackers to steal the proxy password via man-in-the-middle a...
CVE-2021-29044
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Site module's membership request administration pages in Liferay Portal 7.0.0 through 7.3.5, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 1 allows remote attackers to inject arbitrary we...
CVE-2021-29045
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Redirect module's redirection administration page in Liferay Portal 7.3.2 through 7.3.5, and Liferay DXP 7.3 before fix pack 1 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_redirect_web_internal_portlet_RedirectPor...
CVE-2021-29046
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortl...
CVE-2021-29053
PUBLISHED: 2021-05-17
Multiple SQL injection vulnerabilities in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1 allow remote authenticated users to execute arbitrary SQL commands via the classPKField parameter to (1) CommerceChannelRelFinder.countByC_C, or (2) CommerceChannelRelFinder.findByC_C.