{"id":7313,"date":"2017-04-11T14:10:32","date_gmt":"2017-04-11T22:10:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/11\/news-1104\/"},"modified":"2017-04-11T14:10:32","modified_gmt":"2017-04-11T22:10:32","slug":"news-1104","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/11\/news-1104\/","title":{"rendered":"Sundown EK gone missing, Terror EK flavours seen in active drive-by campaigns"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 11 Apr 2017 21:12:19 +0000<\/strong><\/p>\n<p>Many security researchers tracking exploit kits have noted the lack of Sundown EK activity for several weeks now. A post from Cisco&#8217;s Talos team came off as a bit of\u00a0a surprise at\u00a0the end of March (<a href=\"http:\/\/blog.talosintelligence.com\/2017\/03\/sundown-matures.html\" target=\"_blank\">Threat Spotlight: Sundown Matures<\/a>), but any doubts were squashed by this tweet\u00a0on April 8th\u00a0(<a href=\"https:\/\/twitter.com\/kafeine\/status\/850641013630791682\" target=\"_blank\"><span class=\"s1\">Sundown (Beps) and Nebula out ? More than one month since last hits<\/span><\/a>).<\/p>\n<p>Also, whatever happened to <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-bizarro-sundown-exploit-kit-spreads-locky\/\" target=\"_blank\">Bizarro and Greenflash\u00a0Sundown EKs<\/a>? Whether this is a temporary break\u00a0or yet another dead EK, time will tell.<\/p>\n<p>In the meantime, there has been much noise and some activity from an exploit kit\u00a0that appeared late last year and which we <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/the-curious-case-of-a-sundown-ek-variant-dropping-a-cryptocurrency-miner\/\" target=\"_blank\">wrote about<\/a> in early January. Because of similarities with Sundown EK, we initially thought that it was simply a new variant but it was actually from a different actor and called <a href=\"https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/Terror-Exploit-Kit--More-like-Error-Exploit-Kit\/\" target=\"_blank\">Terror EK by Spider Labs<\/a>.<\/p>\n<p>In this post Angler era, we have been accustomed to one hit wonders or bogus kits stolen and repackaged for sale under a different name. Simon Kenin over at Trustwave <a href=\"https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/Underground-Scams--Cutting-the-Head-Off-a-Snake\/\" target=\"_blank\">tracked and exposed<\/a> the activities of \u00a0the author of the Terror EK, going by the handle @666_KingCobra, in various underground forums. To make matters more complicated, there is a thing right now with rebranding and Terror EK has been known to be called <a href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/new-blaze-exploit-kit-claims-to-exploit-recent-cisco-webex-vulnerability\/\" target=\"_blank\">Blaze<\/a>, <a href=\"https:\/\/malwarebreakdown.com\/2017\/03\/13\/neptune-exploit-kit\/\" target=\"_blank\">Neptune<\/a>, or even\u00a0<a href=\"https:\/\/malwarebreakdown.com\/2017\/04\/04\/a-familiar-ek-gets-re-themed-again\/\" target=\"_blank\">Eris<\/a>.<\/p>\n<p>With all this noise, it&#8217;s usually a good idea to look at what is actively being seen\u00a0in the wild versus what may be advertised here and there. Once we see an exploit kit in various distribution campaigns we know\u00a0it is at least worth looking at.<\/p>\n<h3>Malvertising campaigns<\/h3>\n<p>We have been monitoring this particular campaign for some time and this is the instance of Terror EK most known about. Various ad networks (low quality traffic) are pushing this at the moment.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Malvertising_flow.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17428\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Malvertising_flow.png\" alt=\"\" width=\"754\" height=\"281\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Malvertising_flow.png 754w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Malvertising_flow-300x112.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Malvertising_flow-600x224.png 600w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/a><\/p>\n<h4><strong>Main landing page:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_main_landing.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17429\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_main_landing.png\" alt=\"\" width=\"795\" height=\"669\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_main_landing.png 795w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_main_landing-300x252.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_main_landing-600x505.png 600w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/a><\/p>\n<h4><strong>IE exploits:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_IE_exploits.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17430\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_IE_exploits.png\" alt=\"\" width=\"793\" height=\"773\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_IE_exploits.png 793w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_IE_exploits-300x292.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_IE_exploits-600x585.png 600w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/a><\/p>\n<h4><strong>Call to Flash exploits:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoSWF.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17431\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoSWF.png\" alt=\"\" width=\"778\" height=\"710\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoSWF.png 778w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoSWF-300x274.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoSWF-600x548.png 600w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/a><\/p>\n<h4><strong>Call to Silverlight exploit:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoXAP.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17433\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoXAP.png\" alt=\"\" width=\"610\" height=\"337\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoXAP.png 610w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoXAP-300x166.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/malvert_calltoXAP-600x331.png 600w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/a><\/p>\n<p><em>Malware payload: Smoke Loader<\/em><\/p>\n<h3>Compromised sites campaign<\/h3>\n<p>This is a newer campaign we started to notice\u00a0just a few days ago with the landing and payloads slightly different.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Compromised_site_flow.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17461\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Compromised_site_flow.png\" alt=\"\" width=\"660\" height=\"216\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Compromised_site_flow.png 660w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Compromised_site_flow-300x98.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Compromised_site_flow-600x196.png 600w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><\/p>\n<h4><strong>Redirection to EK:<\/strong><\/h4>\n<p>The compromised websites\u00a0are leveraged to redirect to the exploit kit landing page in two different ways (but both are implemented). The first is the server 302 redirect call:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/302_redir.png\" target=\"_blank\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17448\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/302_redir.png\" alt=\"\" width=\"645\" height=\"437\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/302_redir.png 645w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/302_redir-300x203.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/302_redir-600x407.png 600w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/a><\/p>\n<p>But there is also another one done via\u00a0script injection:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/redir.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17441\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/redir.png\" alt=\"\" width=\"657\" height=\"549\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/redir.png 657w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/redir-300x251.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/redir-600x501.png 600w\" sizes=\"auto, (max-width: 657px) 100vw, 657px\" \/><\/a><\/p>\n<p>We\u00a0see\u00a0both of them in use, but each pushes their own flavour of Terror EK (classic one shown above via malvertising or the newer one). For example, the redir via script injection loads uploadrobot.download which in turn calls the &#8216;classic&#8217; Terror landing:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/uploadrobot.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17446\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/uploadrobot.png\" alt=\"\" width=\"624\" height=\"324\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/uploadrobot.png 624w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/uploadrobot-300x156.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/uploadrobot-600x312.png 600w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<h4><strong>Landing page:<\/strong><\/h4>\n<p>This one stuffs everything into the landing page (rather than via multiple sessions). No lorem ipsum here, but some pretty lengthy text which precedes the various calls for exploits.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_landing1.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17442\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_landing1.png\" alt=\"\" width=\"821\" height=\"721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_landing1.png 821w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_landing1-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_landing1-600x527.png 600w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/a><\/p>\n<h4><strong>IE exploits:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_IE.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17443\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_IE.png\" alt=\"\" width=\"821\" height=\"721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_IE.png 821w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_IE-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_IE-600x527.png 600w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/a><\/p>\n<h4><strong>Flash exploits:<\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_flash_exploits.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17444\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_flash_exploits.png\" alt=\"\" width=\"821\" height=\"721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_flash_exploits.png 821w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_flash_exploits-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_flash_exploits-600x527.png 600w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/a><\/p>\n<p>Payload deployment (remember &#8216;<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/10\/new-looking-sundown-ek-drops-smoke-loader-kronos-banker\/\" target=\"_blank\">Sub fire()<\/a>&#8216;?)<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_subfire.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17445\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_subfire.png\" alt=\"\" width=\"821\" height=\"721\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_subfire.png 821w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_subfire-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/compro_subfire-600x527.png 600w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/a><\/p>\n<p><em>Malware payload: Andromeda<\/em><\/p>\n<h3>More copycats on the horizon<\/h3>\n<p>Sundown EK was notorious for stealing\u00a0exploits from others and the tradition continues with more copy\/paste from the ashes of dead exploit kits. If this harvesting was\u00a0done on higher grade EKs, we would have a more potent threat but this isn&#8217;t the case here.<\/p>\n<p>If it weren&#8217;t for active distribution campaigns, there would be very little to write about those numerous variants until they brought in something more serious to the table.<\/p>\n<p>Malwarebytes users are protected against this exploit kit and its payloads.<\/p>\n<h3>IOCs:<\/h3>\n<p>Gates:<\/p>\n<pre>http:\/\/sweetwine.club  http:\/\/uploadrobot.download\/frame.php<\/pre>\n<p>Classic Terror EK patterns:<\/p>\n<pre>http:\/\/46.101.101.142\/e71cac9dd645d92189c49e2b30ec627a\/5f9987ccc0625389623525a46116f048  http:\/\/46.101.101.142\/5f9987ccc0625389623525a46116f048\/795819\/58e9d4f033acc  http:\/\/46.101.101.142\/5f9987ccc0625389623525a46116f048\/a39401275d1b300aa789fb22aea4148a  http:\/\/46.101.101.142\/5f9987ccc0625389623525a46116f048\/9526e055c9757becf45c5190facfd9f2  http:\/\/46.101.101.142\/5f9987ccc0625389623525a46116f048\/oiuhygnjda.swf  http:\/\/46.101.101.142\/5f9987ccc0625389623525a46116f048\/uploads\/wdioj124.swf  http:\/\/159.203.185.4\/uploads\/SilverApp1.xap  http:\/\/46.101.101.142\/d\/5f9987ccc0625389623525a46116f048\/?q=r4&amp;r=28bac89052d8b2cb744a71a57b824a84&amp;e=cve20146332<\/pre>\n<p>New Terror EK patterns:<\/p>\n<pre>http:\/\/46.166.185.57\/9bfJS8fGH3ajrwj5oLPi3ml8\/1nMSGFjFkw5a.php  http:\/\/46.166.185.57\/9bfJS8fGH3ajrwj5oLPi3ml8\/ovRHl8aX9cp4\/NyhUcUzgwLZe.swf  http:\/\/46.166.185.57\/9bfJS8fGH3ajrwj5oLPi3ml8\/Zgtb0yL6c0qS\/vACS5uJmHoxe.swf  http:\/\/46.166.185.57\/9bfJS8fGH3ajrwj5oLPi3ml8\/Si7RBmLPbtk3\/EZZ0lzVwV8ds.swf  http:\/\/46.166.185.57\/9bfJS8fGH3ajrwj5oLPi3ml8\/Gopu04Ttg5s1.php<\/pre>\n<p>Flash exploits:<\/p>\n<pre>7c9c76fbf156fbc5bffbfce1033d06a35b64cee49c01b09df47fa2642ad1a0b6  890f8756e6ab3bd62a2c3fbd098471e17db56808b19018119c0ad4a26ed7060f  97f107853c99b0de95a3e5b84ad1435e31cb42bd05d495d585e18f81a59a362d<\/pre>\n<p>Andromeda:<\/p>\n<pre>6b40885fefbce6b1422f568a966c63e2468408f8f979746617c115070fbdd3fe<\/pre>\n<p>Smoke Loader:<\/p>\n<pre>537ea229cc0d4b65e27ae59286a712a1a8f0f5630b2a945c71d86f6c5dbed848<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns\/\">Sundown EK gone missing, Terror EK flavours seen in active drive-by campaigns<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 11 Apr 2017 21:12:19 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns\/' title='Sundown EK gone missing, Terror EK flavours seen in active drive-by campaigns'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-7237140-stressed-and-worried-businessman-xxl.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>With another player out at the moment, we take a look at a rebranded exploit kit in current malware campaigns.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits-kits\/\" rel=\"tag\">exploits kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sundown-ek\/\" rel=\"tag\">Sundown EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terror-ek\/\" rel=\"tag\">Terror EK<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns\/' title='Sundown EK gone missing, Terror EK flavours seen in active drive-by campaigns'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/sundown-ek-gone-missing-terror-ek-flavours-seen-in-active-drive-by-campaigns\/\">Sundown EK gone missing, Terror EK flavours seen in active drive-by campaigns<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10987,11944,10539,11945,10494],"class_list":["post-7313","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits","tag-exploits-kits","tag-sundown-ek","tag-terror-ek","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7313"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7313\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}