{"id":8234,"date":"2017-07-05T09:10:21","date_gmt":"2017-07-05T17:10:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/05\/news-2009\/"},"modified":"2017-07-05T09:10:21","modified_gmt":"2017-07-05T17:10:21","slug":"news-2009","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/05\/news-2009\/","title":{"rendered":"AdGholas malvertising thrives in the shadows of ransomware outbreaks"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 05 Jul 2017 16:05:57 +0000<\/strong><\/p>\n<p>The latest\u00a0wave of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/petya-esque-ransomware-is-spreading-across-the-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a>\u00a0following the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/wanacrypt0r-ransomware-hits-it-big-just-before-the-weekend\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry<\/a> outbreak\u00a0has kept everyone very busy and been the topic of many\u00a0conversations.\u00a0In the meantime, other\u00a0threat actors have been\u00a0quite active and perhaps even enjoyed\u00a0this complimentary diversion. This is certainly true for the most prolific malvertising gang of the moment, dubbed <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/massive-adgholas-malvertising-campaigns-use-steganography-and-file-whitelisting-to-hide-in-plain-sight\" target=\"_blank\" rel=\"noopener noreferrer\">AdGholas<\/a>.<\/p>\n<p>Exposed a few times this year by <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/adgholas-malvertising-campaign-using-astrum-ek-deliver-mole-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">ProofPoint<\/a> and <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/adgholas-malvertising-campaign-employs-astrum-exploit-kit\/\" target=\"_blank\" rel=\"noopener noreferrer\">TrendMicro<\/a>, AdGholas\u00a0is playing a whack-a-mole game with the ad industry to distribute malware onto unsuspecting users with the help of the Astrum exploit kit.<\/p>\n<p>A\u00a0master of\u00a0disguise, AdGholas has been flying right under the nose of several top ad networks while\u00a0benefiting from the &#8216;first to move&#8217; effect. Indeed, the malvertising\u00a0operators are able to quickly roll out and activate a fake advertising\u00a0infrastructure for a few days before getting banned.<\/p>\n<p>On <strong>June 28<\/strong> (which is about ten days after it was <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/adgholas-malvertising-campaign-employs-astrum-exploit-kit\/\" target=\"_blank\" rel=\"noopener noreferrer\">last publicly reported<\/a>), we started seeing a new wave of drive-by download attacks distributed globally pushing the Astrum exploit kit. Sure enough, it was associated with\u00a0AdGholas activity via a decoy website. Behind the fake ad banners for &#8216;expert essays&#8217; designed to trick ad agencies, laid code to exploit and infect users who simply happened to visit popular\u00a0websites.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/expert_essays_advert.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18728\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/expert_essays_advert.png\" alt=\"\" width=\"1215\" height=\"877\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/expert_essays_advert.png 1215w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/expert_essays_advert-300x217.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/expert_essays_advert-600x433.png 600w\" sizes=\"auto, (max-width: 1215px) 100vw, 1215px\" \/><\/a><\/p>\n<p>The fraudulent website <em>expert-essays[.]com<\/em>, which was registered June 22,\u00a0is using a certificate from Let&#8217;s Encrypt, and is a replica from\u00a0<em>essayoneday.com<\/em>. There are only a few minor visual differences\u00a0between the two, and a cursory review would reveal\u00a0the copycat. However, it is easier said than done in an industry dominated by automation and volume.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/certs.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18659\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/certs.png\" alt=\"\" width=\"1602\" height=\"603\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/certs.png 1602w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/certs-300x113.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/certs-600x226.png 600w\" sizes=\"auto, (max-width: 1602px) 100vw, 1602px\" \/><\/a><\/p>\n<p>After getting caught, AdGholas came back up again on <strong>July 1st<\/strong> and <strong>2nd &#8211;\u00a0<\/strong>perhaps a long holiday week-end in the US may have seemed like the right timing &#8211;\u00a0via a new decoy site, <em>jet-travels[.]com<\/em>, with the same modus operandi:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/jet_travels_agholas.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18735\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/jet_travels_agholas.png\" alt=\"\" width=\"814\" height=\"465\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/jet_travels_agholas.png 814w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/jet_travels_agholas-300x171.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/jet_travels_agholas-600x343.png 600w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><\/a><\/p>\n<h2>From AdGholas to Astrum EK<\/h2>\n<p>We collected artifacts\u00a0that show us the redirection between the AdGholas group\u00a0and the Astrum exploit kit. This kind of redirect is highly conditional in order to evade the majority of ad scanners. While many malvertising actors do not care about cloaking, it is very important to others such as AdGholas because stealthiness\u00a0is\u00a0a strength that contributes to its longevity.<\/p>\n<p>The redirect tag hosted on expert-essays[.]com loads a landing page for\u00a0the Astrum exploit kit with:<\/p>\n<p><em>[&#8220;javascript:%27&lt;meta http-equiv=refresh content=\\&#8221;0;url=&#8221;,&#8221;\\&#8221;&gt;%27&#8243;,&#8221;https:\/\/comm.clamotten.com\/7pkzi\/-fb2j5s48sv4b\/nlo17hdt0cexguqnir\/kqh-xya-c6do32smjwh9mnc0&#8243;,&#8221;ae0a5bca85a8f0e1&#8243;]<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/traffic_flow.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18705\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/traffic_flow.png\" alt=\"\" width=\"1125\" height=\"894\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/traffic_flow.png 1125w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/traffic_flow-300x238.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/traffic_flow-600x477.png 600w\" sizes=\"auto, (max-width: 1125px) 100vw, 1125px\" \/><\/a><\/p>\n<p>The group behind Astrum EK is also very sneaky, making good use of SSL, domain shadowing and other server side tricks that render\u00a0traffic collection and replay a challenge. In the current exploit kit landscape, domain shadowing has been slowed down and the popular RIG EK is mainly resorting (other than for a few exceptions) to IP addresses, in lieu of shadowed domains. As far as serving the content, plain HTTP is the norm, setting Astrum EK apart from the rest.<\/p>\n<p>For a long time banking Trojans were the payload of choice for Astrum EK. This seemed to fit in with the elusive and muffled nature of the exploit kit. However, <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/adgholas-malvertising-campaign-using-astrum-ek-deliver-mole-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">according to ProofPoint<\/a>, new AdGholas\/Astrum infection chains have recently been dropping ransomware. Although it&#8217;s a change from\u00a0those threat actors&#8217; style, cashing in on the ransomware frenzy makes sense.<\/p>\n<h2>Containment and\u00a0protection<\/h2>\n<p>Malvertising continues to affect users on a large scale and is\u00a0a relied upon infection vector for threat actors. The recent and renewed activity from sophisticated groups like AdGholas is something to watch out for in a drive-by landscape dominated by malvertising-borne attacks more so than from compromised sites.<\/p>\n<p>Ad-blockers are one of several layers end users can rely on, but it is worth noting that even <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/roughted-the-anti-ad-blocker-malvertiser\/\" target=\"_blank\" rel=\"noopener noreferrer\">ad-blockers can be bypassed<\/a> and do not fix the most common underlying issue which is\u00a0outdated software. In other words, patching machines regularly immediately raises the difficulty level for an attacker to compromise your system. However, knowing that threat actors like AdGholas and Astrum EK are advanced and have employed zero-days, it is also important to use a signature-less and proactive defense to handle those cases.<\/p>\n<p>We&#8217;re happy to report that\u00a0<a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes<\/a> users were protected against these malvertising campaigns already.<\/p>\n<h2>Indicators of compromise (IOCs)<\/h2>\n<p>AdGholas:<\/p>\n<pre>expert-essays[.]com  jet-travels[.]com  5.34.180.73  162.255.119.165<\/pre>\n<p>Astrum Exploit Kit:<\/p>\n<pre>uniy[.]clamotten[.]com  comm[.]clamotten[.]com  comp[.]computer-tutor[.]info  lexy[.]computer-tutor[.]info  sior[.]ccnacertification[.]info  kvely[.]our-health[.]us  nuent[.]mughalplastic[.]com  mtive[.]linksaffpixel[.]com  cons[.]pathpixel[.]com  sumer[.]pathlinkaff[.]com  nsruc[.]ah7xb[.]com  ction[.]ah7xb[.]com  nstru[.]onlytechtalks[.]com  const[.]linksaffpixel[.]com  quely[.]onlytechtalks[.]com  coneq[.]modweave[.]com  94.156.174.11  SWF: 4ad7556a7ef85be260a8c10cfbc855234f0e9b8880db2be17ad0ad1d6e52909e<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/\">AdGholas malvertising thrives in the shadows of ransomware outbreaks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 05 Jul 2017 16:05:57 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/' title='AdGholas malvertising thrives in the shadows of ransomware outbreaks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/shutterstock_503974750.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Several large malvertising campaigns went unnoticed amidst the news of the latest ransomware outbreak.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/exploits\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adgholas\/\" rel=\"tag\">adgholas<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/astrum\/\" rel=\"tag\">astrum<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/' title='AdGholas malvertising thrives in the shadows of ransomware outbreaks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/adgholas-malvertising-thrives-shadows-ransomware-outbreaks\/\">AdGholas malvertising thrives in the shadows of ransomware outbreaks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12907,12908,4503,10527,10534,10987,10531],"class_list":["post-8234","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adgholas","tag-astrum","tag-cybercrime","tag-ek","tag-exploit-kit","tag-exploits","tag-malvertising"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8234"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8234\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}