Cybersecurity , Data Breach , Risk Management
Disrupt Attack Campaigns with Network Traffic Security Analytics- Details
- Category: Security News
Anti-Malware , Fraud , Technology
Commercial Version of Exploit Kit No Longer for Sale
One of the most potent tools for hacking computers, the Angler exploit kit, effectively disappeared one week ago, and many experts believe that development is connected to a large roundup of suspected cybercriminals in Russia. But Angler isn't necessarily going away; it may just be retrenching.
See Also: The Inconvenient Truth About API Security
Known in underground circles as "XXX," Angler is an exploit kit, which is a server-based framework that quickly scans a computer for browser-related software vulnerabilities and silently delivers malware through web-based attacks.
Exploit kits have dramatically changed the computer security landscape. Engineered by highly skilled cybercriminals, the kits are offered for rent to other hackers who want to spread their malware.
Angler was one of the most-seen exploit kits last year. It cost as much as $5,000 per month to rent and in part was responsible for the prevalence of file-encrypting malware known as ransomware.
Around June 6, however, attacks linked to Angler almost completely vanished. Five days prior, Russia's security agency, the FSB, said it arrested 50 people for allegedly stealing 1.7 billion rubles ($25.5 million) from several Russian financial services firms over a five-year period using the "Lurk" malware (see Russian Police Bust Alleged Bank Malware Gang).
Angler's developers have long been suspected to be operating from Russia or Eastern Europe.
The exploit kit's disappearance "is not coincidental, that's what we think," says Andrei Barysevich, director of Eastern European research and analysis for Flashpoint, a company that specializes in cybercrime intelligence. "At first we have 50 guys arrested in Russia, then within a week, Angler literally disappears."
Just Laying Low?
It appears that Angler's developers have just decided to lay low following the arrests. Andrew Komarov, chief intelligence officer at InfoArmor, says an Angler administrator wrote on an underground forum following the arrests that sales of Angler have been stopped, for now.
The group that was arrested in Russia was apparently one of the biggest customers of Angler, Komarov says. Angler's operators fear law enforcement may lean on those who were arrested to get close to them.
"They simply made the decision to stop sales to prevent infiltration from customers they don't know," Komarov says.
There are two versions of Angler: a private one used for the Angler gang's own operations and a commercial one. Komarov said it's the latter that is temporarily being withdrawn from the market while the group makes technical adjustments to their infrastructure to prevent them from being discovered.
"They're panicking," Komarov says.
At the Top of its Game
Angler's disappearance ironically comes as it had achieved a number-one market position ahead of competitors, including the Neutrino and Nuclear exploit kits.
Part of the reason for Angler's dominance is that its developers have quickly incorporated exploits for zero-day vulnerabilities - often for Adobe's oft-targeted Flash browser plug-in - into its framework. Zero-day vulnerabilities are those that have not been patched by a software vendor, meaning most computers are defenseless against an attack, and Flash's wide install base makes it a natural target.
"We really saw Angler pull out from the back middle of the pack out to the front by the end of the year," says Christopher Budd, global threat communications manager for Trend Micro.
Budd says Angler's complexity and fast development illustrates how security companies are fighting very agile adversaries. "Arguably, there's more professionalization in malware than in startup app development," he says.
Angler was closely held by its creators, Komarov of InfoArmor says. Those who rent it only communicate using encrypted instant messaging, and customers are carefully vetted before a rental deal gets agreed.
Even then, other cybercriminals who rent it do not actually have access to the exploit kit software. Instead, Angler's operators arrange technical access to their own servers that host the kit by providing a configuration file.
A hacker who rents Angler provides a domain name for a compromised website to Angler's operators. If a victim goes to the compromised website, the traffic is then tunneled through various proxies to a server hosting Angler, in order for the exploits to be delivered.
It's a complicated procedure, and one that isn't easy for security experts to untangle. Furthermore, a malware payload - which is what is delivered after an attack, such as ransomware - is often encrypted and won't necessarily be detected at first by security software.
"If you think about it, [Angler] is so turnkey, and it has the ability to really protect itself and protect its backend services," says Wayne Crowder, director of threat intelligence at RiskAnalytics. "It's hard to track, hard to trace. It shows its value. I hate to say that when cybercriminals are doing it."
Angler's use in spreading ransomware has helped make that type of malware one of the biggest threats on the internet. Over the past couple of years, Angler has been used to deliver ransomware variants including CryptoWall, TelsaCrypt, AlphaCrypt and most recently, CryptXXX.
"Anti-virus in general has reasonably poor coverage against Angler," says Craig Williams, security outreach manager at Cisco.
Neutrino Fills the Void
In the absence of the commercial version of Angler, developers of another exploit kit have moved quickly to pick up the slack.
Experts have seen an increase in attacks using Neutrino, also one of the top exploit kits. The security company Malwarebytes has seen several recent large malvertising attacks using Neutrino, writes Jerome Segura, a senior security researcher.
Malvertising is the practice of placing malicious ads with online advertising companies. It's one of the most powerful methods for infecting mass numbers of computers quickly, especially if a high-traffic website displays such an ad. Victims can be infected with malware merely by viewing a malicious ad that is connected to an exploit kit server.
The cost of renting Neutrino has increased following Angler's pullback, says Flashpoint's Barysevich. Neutrino was renting for around $1,500 a month, but that price has spiked in the last few days to $4,000 a month.
"Neutrino is there to take [Angler's] place," he says.
- Details
- Category: Security News
- Details
- Category: Security News
Cybersecurity , Data Breach , Risk Management
Advanced Threats, the Board and You- Details
- Category: Security News
The American Bankers Association rejects the Retail Industry Leaders Association's contention that a legislative proposal to hold retailers to the same cybersecurity standards as banks is unfair (see Retailers: Don't Require Us to Meet Bank Security Standards).
Reacting to a letter RILA recently sent to Congress objecting to provisions in the Data Security Act of 2015, also known as H.R. 2205, Doug Johnson, a senior vice president at the ABA, says the criticisms of the legislation are tantamount to grasping at straws in an effort to prevent retailers from having to be subjected to more stringent regulatory scrutiny of their security measures.
"We're really trying to ensure that, to the greatest extent possible, all businesses adhere to the same level of data security," Johnson says in supporting the legislative proposal in an interview with Information Security Media Group.
"One of the things that we continually hear from the retail side is that banks have to have a higher level of security than the retail environment does. And our response to that has always been that even the smallest credit union has to abide by Gramm-Leach-Bliley," Johnson says. "The smallest credit union, which is maybe akin to the size of the smallest coffee shop, actually has the same requirements. But those requirements scale to the size of the institution and the risks that that institution presents to the overall environment and the kind of sensitive data that that entity has."
So why should retailers be expected to meet the same security standards as banks? "Because they have a lot of the same data," Johnson stresses.
Johnson says he's hopeful Congress will vote on compromise legislation establishing cybersecurity standards, as well as a national standard for breach notification, next year.
During this interview (see audio player below photo), Johnson also discusses:
Why he agrees with retailers that the Federal Trade Commission should be the enforcement body that regulates and enforces cybersecurity for retailers; How information sharing between bankers and retailers will help fuel stronger cooperation between the two groups; and Why protecting payment data along all points of the financial chain is increasingly critical.Johnson leads the ABA's enterprise risk, physical security, cybersecurity, business continuity and resiliency policy and fraud deterrence efforts. He represents the ABA on the Financial Services Sector Coordinating Council, which advises the federal bank regulatory agencies on homeland security and critical infrastructure protection issues.
- Details
- Category: Security News
Many breaches could have been prevented or better mitigated if organizations took basic security steps, such as properly salting and hashing passwords, getting users to pick strong passwords, requiring two-factor authentication for access and patching critical vulnerabilities in a timely manner. But so many breaches continue to demonstrate how even these no-brainer security controls so often aren't employed (see Why Are We So Stupid About Passwords?).
As a result, it can feel like information security déjà vu all over again as security professionals fight so many of the same battles that they were fighting 10 or even 20 years ago, says Cris Thomas, a strategist at vulnerability detection system provider Tenable Network Security who's better known by his "Space Rogue" white hat hacker handle. "We have the knowledge and technology, but for whatever reason, it's not being applied. That still leaves people at risk," he says.
Furthermore, it's unclear how this problem might get remedied, despite the mega-breaches of Target, Home Depot, the U.S. Office of Personnel Management and countless others. "We've had hundreds of wake-up calls," he says. "Either the alarm is not loud enough, or [we] just keep hitting the snooze button."
In this interview with Information Security Media Group at the recent Infosec Europe conference in London, Thomas discusses:
Organizations' failure to sort out passwords, patches and securing critical data; Why the "defense in depth" model is irrevocably broken; The never-ending need for greater visibility into systems and networks; and Internet of Things security challenges.Before joining Tenable Network Security, Thomas served as threat intelligence manager at Trustwave and as the editor of Hacker News Network, which he created. He also was a member of pioneering security research think thank L0pht Heavy Industries and co-founder of internet security consultancy @stake.
More Articles …
Page 3444 of 3546







