{"id":21393,"date":"2023-03-02T16:10:26","date_gmt":"2023-03-03T00:10:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/03\/02\/news-15124\/"},"modified":"2023-03-02T16:10:26","modified_gmt":"2023-03-03T00:10:26","slug":"news-15124","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/03\/02\/news-15124\/","title":{"rendered":"Internet Explorer users still targeted by RIG exploit kit"},"content":{"rendered":"<p>Despite a very slim browser market share, Internet Explorer (IE) is still being exploited by exploit kits like the RIG exploit kit (EK).<\/p>\n<p>One major advantage for the malware distributors behind the exploit kit&nbsp;is that the outdated browser has reached end-of-life (EOL),&nbsp;which means it&nbsp;<a href=\"https:\/\/blogs.windows.com\/windowsexperience\/2022\/06\/15\/internet-explorer-11-has-retired-and-is-officially-out-of-support-what-you-need-to-know\/\">no longer receives security updates<\/a>&nbsp;and patches against known threats.<\/p>\n<p>According to Malwarebytes&rsquo; Senior Director of Threat Intelligence&nbsp;J&eacute;r&ocirc;me Segura:<\/p>\n<blockquote><p>&ldquo;RIG EK is probably one of the last exploit kits targeting Internet Explorer still around. We have observed RIG EK activity via the same malvertising campaigns for the past several years.&rdquo;<\/p><\/blockquote>\n<p>An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers and their plugins in order to deliver malware. The primary infection method with an exploit kit is a drive-by download attack, when cybercriminals lure potential victims to a site where their browser can be fingerprinted and vulnerabilities can be unleashed to infect the system. Ideally for the exploit kit handler, such attacks occur silently within seconds and they do not require any user interaction.<\/p>\n<p>A&nbsp;recent <a href=\"https:\/\/www.prodaft.com\/resource\/detail\/rig-rig-exploit-kit-depth-analysis\" target=\"_blank\">report by Prodaft<\/a>&nbsp;details&nbsp;a wealth of information related to the victim statistics, operation, command and control (C&amp;C) server, and technical aspects of RIG EK.<\/p>\n<p>RIG EK has been around <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2014\/08\/do-not-publish-yet-convincing-youtube-look-alike-fires-rig-exploit-kit\">since 2014<\/a> and, despite many take down efforts, has always managed to make a comeback. Without many changes to the inner workings of the exploit kit itself, we&#8217;ve seen many changes in the malware distributed. It all depends on which cybercriminals&nbsp;pay the RIG EK administrator to install their malware on victim machines. RIG EK&nbsp;has also introduced some newer vulnerabilities while Internet Explorer&#8217;s market share has continued to drop.<\/p>\n<p>Prodaft researchers describe how they noticed RIG EK RIG dropping multiple types of malware, including stealers, Remote Access Trojans (RATs), cryptocurrency miners, and banking malware. The exploits of RIG EK are delivered to unsuspecting victims in two ways: either via malvertising, where users are redirected to online advertising pages that are tricked to execute the RIG exploits on their browser; or when the victim visits sites that were compromised and the exploit kit&rsquo;s JavaScript was injected.<\/p>\n<p>As J&eacute;r&ocirc;me mentions, at Malwarebytes we&#8217;ve seen them involved via the same malvertising campaigns for the past several years.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/easset_upload_file6739_260716_e.png\" alt=\"November 2020 Fiddler analysis\" width=\"783\" height=\"240\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p align=\"center\" style=\"text-align: center; margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\"><i>2020 analysis of malvertising leading to the RIG Exploit Kit<\/i><\/p>\n<p>We connected some RIG EK activity with the&nbsp;cybercriminal behind the &#8220;MakeMoney gate&#8221; (a name coined by security researcher <a href=\"https:\/\/twitter.com\/nao_sec\" target=\"_blank\">@nao_sec<\/a>) based on the domain makemoneywithus[.]work (188.225.75.54) with the earliest instance of this threat group seen in December 2019 via the gate gettime[.]xyz (185.220.35.26).<\/p>\n<p>We still see some hits every week, but nothing to make this exploit kit a real threat anymore. We should note that the threat actor behind the <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\">MakeMoney gate tried the social engineering route<\/a> in 2022, using a fake browser update campaign which was not all that different from the one we saw with SocGholish.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/easset_upload_file20370_260716_e.png\" alt=\"February 2023 analysis\" width=\"795\" height=\"583\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif; text-align: center;\"><em>Very recently recorded malvertising campaign<\/em><\/p>\n<h2>Mitigation<\/h2>\n<p>The main advice to stay out of the claws of exploit kits is clear. Use a fully updated and patched browser. And always be careful before you click on links.<\/p>\n<p>A warning from J&eacute;r&ocirc;me Segura:<\/p>\n<blockquote><p>&ldquo;We can expect RIG EK to stick around to the very end until there is no one left behind to infect. The individual(s) behind the malvertising campaigns have been persistent and still count on victims daring enough to visit shady websites with an outdated computer.&rdquo;<\/p><\/blockquote>\n<hr \/>\n<p dir=\"ltr\">Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"background-color: #0d3ecc; line-height: 50px; padding: 0 20px;\"><a style=\"color: #fff;\" href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">GET STARTED<\/a><\/span><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/internet-explorer-users-still-targeted-by-rig-exploit-kit\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: RIG EK<\/p>\n<p>Tags:  exploit kit<\/p>\n<p>Tags:  MakeMoney<\/p>\n<p>Tags:  Internet Explorer<\/p>\n<p>Tags:  Jerome Segura<\/p>\n<p>The RIG Exploit Kit is one of the last major exploit kits that still targets the legacy Internet Explorer browser.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/internet-explorer-users-still-targeted-by-rig-exploit-kit\" title=\"Internet Explorer users still targeted by RIG exploit kit\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/internet-explorer-users-still-targeted-by-rig-exploit-kit\">Internet Explorer users still targeted by RIG exploit kit<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10534,10829,12933,26504,32,11792],"class_list":["post-21393","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploit-kit","tag-internet-explorer","tag-jerome-segura","tag-makemoney","tag-news","tag-rig-ek"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21393"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21393\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}