{"id":15081,"date":"2015-07-20T16:46:29","date_gmt":"2015-07-20T16:46:29","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4248"},"modified":"2019-11-15T07:03:16","modified_gmt":"2019-11-15T12:03:16","slug":"a-problem-of-exploits","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/a-problem-of-exploits\/15081\/","title":{"rendered":"A problem of exploits"},"content":{"rendered":"<p>Security vendors often mention exploits in their publications as one of the most serious problems with data and systems safety, although it\u2019s not always clear what the difference is between exploits and the malware in general. We\u2019ll try to explain and elaborate here.<\/p>\n<p><strong>What is an exploit?<\/strong><\/p>\n<p>Exploits are malware, or, rather, a subset of such. Exploits are (malicious) programs that contain data or executable code, which is able to take advantage of one or more vulnerabilities in the software running on a local or remote computer.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A problem of exploits #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fj3cM&amp;text=A+problem+of+exploits+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Simply put: You have a browser and there is a vulnerability in it that allow \u201can arbitrary code\u201d to run \u2013 i.e. install and launch some malicious program \u2013 on your system without your knowledge, or cause some other kind of unintended and unanticipated behavior of the system. Most often it is all about allowing privilege escalation for the attackers so they can do anything within the attacked system.<\/p>\n<p>Browsers, along with Flash, Java, and Microsoft Office, are among the most targeted software categories. Being ubiquitous, they are actively explored by security experts and hackers alike, and vendors regularly have to release patches to fix vulnerabilities. It\u2019s best if these patches are applied at once, but unfortunately that is not always the case.<\/p>\n<p>A particular problem is, of course, exploits for the unknown vulnerabilities, discovered and abused by blackhats: so-called zero-days. It may take awhile before the vendors know they have a problem and work it over.<\/p>\n<p><strong>Infection routes<\/strong><\/p>\n<p>The next part is rather technical, so feel free to bypass it unless you\u2019re truly curious of how these things work. Keep in mind, though, that cybercriminals often prefer exploits over other infection methods, since unlike social engineering \u2013 which can be hit or miss \u2013 the use of vulnerabilities continues to produce the desired results.<\/p>\n<p>There are two ways users can be \u201cfed\u201d exploits. First, by visiting a site that contains malicious exploit code. Second, by opening a seemingly legitimate file with hidden malicious code. As one may easily guess, it\u2019s most likely spam or a phishing email that will bring the exploit in.<\/p>\n<p>As <a href=\"https:\/\/securelist.com\/analysis\/publications\/57888\/kaspersky-lab-report-java-under-attack\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019s article has it<\/a>, exploits are designed to strike specific versions of software that contain vulnerabilities. So, if the user has that version of the software to open the malicious object, or if a website is using that software to operate, the exploit is triggered.<\/p>\n<p>Once it gains access through the vulnerability, the exploit then loads additional malware from the criminals\u2019 server which performs malicious activity such as stealing personal data, using the computer as part of a botnet to distribute spam or carry out DDoS attacks, etc.<\/p>\n<p>Exploits pose a threat even for the aware and diligent users who keep their software updated. The reason is a time gap between the discovery of a vulnerability and a release of the patch to fix it.<\/p>\n<p>During that time, exploits are able to function freely and threaten the security of nearly all Internet users \u2013 unless there are automatic tools to prevent exploit attacks installed.<\/p>\n<p><strong>Exploits run in packs <\/strong><\/p>\n<p>Exploits are often packed together so that an attacked system is checked against a wide range of vulnerabilities; once one or more are detected, the appropriate exploits enter. Exploit kits also widely use code obfuscation to avoid detection and encrypt URL paths to prevent researchers from unrooting them.<\/p>\n<p>Among the best known are:<\/p>\n<p><strong>Angler \u2013 <\/strong>one of the most sophisticated kits on the underground market, this one changed the game after it had begun detecting antivirus and virtual machines (often used by security researchers as honeypots), and deploying encrypted dropper files. It is one of the fastest kits to incorporate newly released zero-days and its malware runs from memory, without having to write to the hard drives of its victims. Technical description of the pack is available <a href=\"https:\/\/threatpost.com\/analyzing-angler-the-worlds-most-sophisticated-exploit-kit\/110904\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>Nuclear Pack \u2013 <\/strong>hits its victims with Java and Adobe PDF explots, as well as dropping Caphaw \u2013 a notorious banking Trojan. More data on it is available <a href=\"https:\/\/threatpost.com\/askmen-site-compromised-by-nuclear-pack-exploit-kit\/106822\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>Neutrino<\/strong> \u2013 a Russian-made kit containing a few Java exploits, made <a href=\"http:\/\/news.softpedia.com\/news\/Neutrino-Exploit-Kit-Reportedly-Put-Up-for-Sale-by-Its-Author-430253.shtml\" target=\"_blank\" rel=\"noopener nofollow\">headlines<\/a> last year due to the fact that its owner has put it on sale for a very modest price \u2013 $34,000. Most likely it was done following the arrest of a certain Paunch, creator of\u2026<\/p>\n<p><strong>Blackhole Kit<\/strong> \u2013 the most prevalent web threat of 2012, it targets vulnerabilities in old versions of browsers such as Firefox, Google Chrome, Internet Explorer, and Safari as well as many popular plugins like Adobe Flash, Adobe Acrobat, and Java. After a victim is lured or redirectd to a landing page, an obfuscated JavaScript determines what is on the victim\u2019s computers and loads all exploits to which this computer is vulnerable and sometimes a Java applet tag that loads a Java Trojan horse. If there is an exploit that is usable, the exploit loads and executes a payload on the victim\u2019s computer and informs the Blackhole exploit kit server which exploit was used to load the payload.<\/p>\n<p>It has polymorphic code, so prevention requires a good host-based intrusion prevention system or automatic exploit prevention technology to counter its attacks. Signature-based detection won\u2019t work.<\/p>\n<p>Blackhole, unlike most of the others, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blackhole_exploit_kit\" target=\"_blank\" rel=\"noopener nofollow\">has a dedicated entry in Wikipedia<\/a>, although after Paunch\u2019s arrest the kit itself has almost <a href=\"https:\/\/threatpost.com\/blackhole-and-cool-exploit-kits-nearly-extinct\/103034\" target=\"_blank\" rel=\"noopener nofollow\">died out<\/a>.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>As said before, exploits are a subset of malware, but they are not always detectable by security software if it doesn\u2019t employ behavior analysis \u2013 in fact, it\u2019s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Exploit kits are a long-standing \u201cuniversal\u201d problem for #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fj3cM&amp;text=Exploit+kits+are+a+long-standing+%26%238220%3Buniversal%26%238221%3B+problem+for+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Kaspersky Lab\u2019s Automatic Exploit Prevention uses the information about the most typical behavior of the known exploits. The characteristic behavior of such malicious programs helps to prevent infection even in the case of a previously unknown zero-day vulnerability exploit.<\/p>\n<p>Exploits quite often preload files prior to directly contaminating the system. Automatic Exploit Prevention monitors programs appealing to the network and analyzes the source files.<\/p>\n<p>More information on Automatic Exploit Prevention technology is available <a href=\"https:\/\/business.kaspersky.com\/case-6-automatic-exploit-prevention-against-targeted-attacks\/1338\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploits are a subset of malware, but they are not always detectable by security software if it doesn&#8217;t employ behavior analysis. In fact, it&#8217;s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.<\/p>\n","protected":false},"author":209,"featured_media":15628,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1181,1171],"class_list":{"0":"post-15081","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-aep","10":"tag-exploits"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-problem-of-exploits\/15081\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-problem-of-exploits\/15081\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-problem-of-exploits\/15081\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/aep\/","name":"AEP"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15081"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15081\/revisions"}],"predecessor-version":[{"id":30447,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15081\/revisions\/30447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15628"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}