{"id":10401,"date":"2017-11-09T17:10:09","date_gmt":"2017-11-10T01:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/09\/news-4174\/"},"modified":"2017-11-09T17:10:09","modified_gmt":"2017-11-10T01:10:09","slug":"news-4174","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/09\/news-4174\/","title":{"rendered":"Disdain exploit kit served with a side of social engineering"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000<\/strong><\/p>\n<p>Today we picked up new activity from an exploit kit that was <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-disdain-exploit-kit-detected-wild\/\" target=\"_blank\" rel=\"noopener\">first discovered<\/a> back in August of this year. The Disdain exploit kit, simply identified by a string of the same name found in its source code, is being distributed again after a short interruption via malvertising chains.<\/p>\n<p>Disdain EK relies on older vulnerabilities that have long been patched and some that do not appear to be working properly. From a traffic to infection point of view, this means that the conversion rates are going to be lower than, say, RIG EK, the other most common exploit kit at the moment.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Disdain_traffic.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20489 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Disdain_traffic.png\" alt=\"\" width=\"720\" height=\"207\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Disdain_traffic.png 720w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Disdain_traffic-300x86.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Disdain_traffic-600x173.png 600w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><\/p>\n<p>This may explain why we are seeing Disdain being used as a drive-by download alongside a social engineering attack to increase the likelihood of infections. Case in point, the following site was compromised to serve Disdain EK while also distributing a fake Flash Player update:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/landing.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20487 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/landing.png\" alt=\"\" width=\"729\" height=\"653\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/landing.png 729w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/landing-300x269.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/landing-600x537.png 600w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p>\n<p>What&#8217;s interesting is that both payloads (Disdain&#8217;s and the Flash update) are actually the same malware binary, just delivered by different methods. The former is loaded via an <em>iframe<\/em> injected into the page, while the latter is a regular download that requires user interaction to execute it:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/sourcecode.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20493 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/sourcecode.png\" alt=\"\" width=\"716\" height=\"411\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/sourcecode.png 716w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/sourcecode-300x172.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/sourcecode-600x344.png 600w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/a><\/p>\n<p>Disdain&#8217;s landing page exploits older Internet Explorer vulnerabilities and attempts to load Flash exploits as well, although in our tests these did not work.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/disdain_code.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20492 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/disdain_code.png\" alt=\"\" width=\"682\" height=\"208\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/disdain_code.png 682w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/disdain_code-300x91.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/disdain_code-600x183.png 600w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/a><\/p>\n<p>The final payload, served either via the exploit or social engineering route, is <a href=\"https:\/\/www.virustotal.com\/#\/file\/705bb6094a2591ce7ac329ec40f7fd3147d120985fb80b980dd75a5c8c51a2b7\/detection\" target=\"_blank\" rel=\"noopener\">Neutrino Bot<\/a>, which we have <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/post-holiday-spam-campaign-delivers-neutrino-bot\/\" target=\"_blank\" rel=\"noopener\">documented<\/a> on this blog before when it was served in malicious spam campaigns.<\/p>\n<p>In the past few weeks, there have been a few developments in the exploit kit scene beyond the long running RIG exploit kit, where threat actors are attempting new tricks both from an evasion and distribution point of view. Despite this, there remains a lack of innovation in what really matters at the end of the day: the exploits being used to deliver drive-by infections.<\/p>\n<p>While <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/kovter-group-malvertising-campaign-exposes-millions-potential-ad-fraud-malware\" target=\"_blank\" rel=\"noopener\">some groups<\/a> have switched to pure social engineering-based attacks, others are attempting either or both methods at once. In the current threat landscape, the campaigns that have the most success are those that can draw a lot of traffic and use clever techniques to fool users.<\/p>\n<p>Systems that have been patched regularly would not be affected by this exploit kit, but at the same time users should beware of non-legitimate software updates. Many of the so-called &#8220;Flash Player&#8221; or &#8220;Video Player&#8221; updates typically push adware and, as we saw recently with the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/badrabbit-closer-look-new-version-petyanotpetya\/\" target=\"_blank\" rel=\"noopener\">BadRabbit<\/a> outbreak, even ransomware.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are protected from the Disdain exploit kit and Neutrino Bot malware.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/\">Disdain exploit kit served with a side of social engineering<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/' title='Disdain exploit kit served with a side of social engineering'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/disdain\/\" rel=\"tag\">Disdain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/neutrino\/\" rel=\"tag\">neutrino<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/' title='Disdain exploit kit served with a side of social engineering'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/\">Disdain exploit kit served with a side of social engineering<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16529,10527,10534,10987,11338,10494],"class_list":["post-10401","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-disdain","tag-ek","tag-exploit-kit","tag-exploits","tag-neutrino","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10401"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10401\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}