{"id":15657,"date":"2019-06-26T11:10:05","date_gmt":"2019-06-26T19:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/26\/news-9405\/"},"modified":"2019-06-26T11:10:05","modified_gmt":"2019-06-26T19:10:05","slug":"news-9405","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/26\/news-9405\/","title":{"rendered":"GreenFlash Sundown exploit kit expands via large malvertising campaign"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Jun 2019 18:30:48 +0000<\/strong><\/p>\n<p>Exploit kit activity has been relatively quiet for some time, with the occasional malvertising campaign reminding us that drive-by downloads are still a threat.<\/p>\n<p>However, during the past few days we noticed a spike in our telemetry for what appeared to be a new exploit kit. Upon closer inspection we realized it was actually the very elusive GreenFlash Sundown EK.<\/p>\n<p>The threat actors behind it have a unique modus operandi that consists of compromising ad servers that are run by website owners. In essence, they are able to poison the ads served by the affected publisher via this unique kind of malvertising.<\/p>\n<p>In this blog, we review their latest compromise responsible for pushing ransomware, Pony and a coin miner onto a large number of victims.<\/p>\n<h3>Stealthy compromise<\/h3>\n<p>At first, we believed the attack originated from one ad network, but we were able to pinpoint where it came from by reviewing traffic captures. The affected publisher is onlinevideoconverter[.]com, one of the most popular sites to convert videos. According to <a rel=\"noreferrer noopener\" aria-label=\"SimilarWeb (opens in a new tab)\" href=\"https:\/\/www.similarweb.com\/website\/onlinevideoconverter.com#overview\" target=\"_blank\">SimilarWeb<\/a>, it drives 200 million visitors per month:<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39295\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/similarweb-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb.png\" data-orig-size=\"963,480\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"similarweb\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb-300x150.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb-600x299.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb.png\" alt=\"\" class=\"wp-image-39295\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb.png 963w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb-300x150.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/similarweb-600x299.png 600w\" sizes=\"(max-width: 963px) 100vw, 963px\" \/><\/a><\/figure>\n<p>People navigating to the page to convert YouTube videos into the MP4 format will be sent to the exploit kit, but only after some very careful fingerprinting. The full redirection sequence is shown below:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39302\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/trafficview\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview.png\" data-orig-size=\"731,258\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"trafficview\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview-300x106.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview-600x212.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview.png\" alt=\"\" class=\"wp-image-39302\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview.png 731w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview-300x106.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview-600x212.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/trafficview-470x165.png 470w\" sizes=\"(max-width: 731px) 100vw, 731px\" \/><\/a><\/figure>\n<\/div>\n<p>The redirection mechanism is cleverly hidden within a fake GIF image that actually contains a well obfuscated piece of JavaScript:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39297\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/gif-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF.png\" data-orig-size=\"654,485\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"GIF\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF-300x222.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF-600x445.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF.png\" alt=\"\" class=\"wp-image-39297\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF-300x222.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/GIF-600x445.png 600w\" sizes=\"(max-width: 654px) 100vw, 654px\" \/><\/a><\/figure>\n<\/div>\n<p>After some painful debugging, we can see that it links to fastimage[.]site:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39298\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/script-12\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script.png\" data-orig-size=\"843,387\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"script\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script-300x138.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script-600x275.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script.png\" alt=\"\" class=\"wp-image-39298\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script.png 843w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/script-600x275.png 600w\" sizes=\"(max-width: 843px) 100vw, 843px\" \/><\/a><\/figure>\n<\/div>\n<p>The next few sessions contain more interesting code including a file loaded from fastimage[.]site\/uptime.js which is actually a Flash object.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39299\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/flash_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_.png\" data-orig-size=\"734,531\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flash_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_-300x217.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_-600x434.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_.png\" alt=\"\" class=\"wp-image-39299\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_.png 734w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_-300x217.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/flash_-600x434.png 600w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><\/a><\/figure>\n<p>This performs the redirection to adsfast[.]site which we recognize as being part of the GreenFlash Sundown exploit kit. It uses a Flash Exploit to deliver its encoded payload via PowerShell:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39300\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/powershell1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1.png\" data-orig-size=\"826,146\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"powershell1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1-300x53.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1-600x106.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1.png\" alt=\"\" class=\"wp-image-39300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1.png 826w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1-300x53.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/powershell1-600x106.png 600w\" sizes=\"(max-width: 826px) 100vw, 826px\" \/><\/a><\/figure>\n<\/div>\n<p>Leveraging PowerShell is interesting because it allows to do some pre-checks before deciding to drop the payload or not. For example, in this case it will check that the environment is not a Virtual Machine. If the environment is acceptable, it will deliver a very visible payload in SEON ransomware:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39301\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/seonransomware\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware.png\" data-orig-size=\"1809,975\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"seonransomware\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware-300x162.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware-600x323.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware.png\" alt=\"\" class=\"wp-image-39301\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware.png 1809w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware-300x162.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/seonransomware-600x323.png 600w\" sizes=\"(max-width: 1809px) 100vw, 1809px\" \/><\/a><\/figure>\n<\/div>\n<p>The ransomware uses a batch script to perform some of its duties, such as deleting shadow copies:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39303\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/attachment\/batch-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch.png\" data-orig-size=\"690,428\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"batch\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch-300x186.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch-600x372.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch-600x372.png\" alt=\"\" class=\"wp-image-39303\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch-600x372.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch-300x186.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/batch.png 690w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>GreenFlash Sundown EK will also drop Pony and a coin miner while victims struggle to decide the best course of action in order to recover their files.<\/p>\n<h3>Wider campaign<\/h3>\n<p>Our previous encounters with GreenFlash Sundown EK, for example during our <a rel=\"noreferrer noopener\" aria-label=\"winter 2019 exploit kits review (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/exploit-kits-winter-2019-review\/\" target=\"_blank\">winter 2019 exploit kits review<\/a>, were always limited to South Korea. However, based on our telemetry this campaign is affecting people all over the globe, which is an interesting departure for this threat group.<\/p>\n<p>Malwarebytes users were already protected against this drive-by attack and we have informed the publisher about the compromise so that they can take action.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>GreenFlash Sundown infrastructure:<\/strong><br \/>hxxps[:\/\/]fastimage[.]site\/<br \/>hxxp[:\/\/]adsfast[.]site\/<br \/>hxxp[:\/\/]accomplishedsettings[.]cdn-cloud[.]club\/<br \/>104.248.42[.]143<br \/>172.105.66[.]231<br \/>198.211.126[.]118<\/p>\n<p><strong>Seon ransomware:<\/strong><br \/>a89591555b9acb65353c2b854e582bc41db2fbc0eda2210b89a877d1862084df<br \/>591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b<\/p>\n<p><strong>Pony:<\/strong><br \/>c772bdf4bd05ab63d90f4399e97a1d7eec2891c221739e3b843f9a8c9eddf4d3<br \/>9ff00b46b949bd76923137c0b0ed3cd4e252d6e88a55e9b4798525fa40164850<\/p>\n<p><strong>Coin miner:<\/strong><br \/>58002d0b8acd1a539503d8ea02ff398e7ad079e0b856087f0ca30d767588be4e<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/\">GreenFlash Sundown exploit kit expands via large malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 26 Jun 2019 18:30:48 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/' title='GreenFlash Sundown exploit kit expands via large malvertising campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/shutterstock_626138888.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The GreenFlash exploit kit, which we typically saw targeting South Korean users, reaches globally with a large malvertising campaign via a popular website.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/greenflash-sundown\/\" rel=\"tag\">GreenFlash Sundown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/seon-ransomware\/\" rel=\"tag\">seon ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/' title='GreenFlash Sundown exploit kit expands via large malvertising campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign\/\">GreenFlash Sundown exploit kit expands via large malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10527,10534,10987,17951,10531,22118,10494],"class_list":["post-15657","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ek","tag-exploit-kit","tag-exploits","tag-greenflash-sundown","tag-malvertising","tag-seon-ransomware","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15657"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15657\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15657"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}