Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Blackhole Exploit Kit Use Falls Off After Arrest

Two weeks ago, it was reported that police in Russia arrested the reputed author of the Blackhole Exploit kit, a man who went by the hacker alias ‘Paunch.’ In the aftermath, the number of spam campaigns using Blackhole to distribute malware fell off, and in the past two weeks have still not recovered.

Two weeks ago, it was reported that police in Russia arrested the reputed author of the Blackhole Exploit kit, a man who went by the hacker alias ‘Paunch.’ In the aftermath, the number of spam campaigns using Blackhole to distribute malware fell off, and in the past two weeks have still not recovered.

According to security researchers, use of the exploit kit seems to have chilled for the moment, and some cyber-crew have started switching tactics. For example, researchers at Dell SecureWorks report that following the arrest, one of the groups using the Cutwail spam botnet stopped spamming out links leading to the Blackhole exploit kit in favor of another kit known in the security community as Magnitude (formerly Popads).

In that case, the spam emails have links that open up to a website that tells the user their browser is not up to date as a ruse to get them to download Gameover Zeus while a malicious iFrame redirects the browser to the Magnitude exploit kit. At that point, Magnitude installs the infamous ZeroAccess Trojan on the user’s system if they are susceptible to any of the targeted vulnerabilities, such as CVE-2011-3402 (Windows) and CVE-2013-0633 (Adobe Flash Player).

“Blackhole operations have gone silent,” said Richard Henderson, security strategist at FortiGuard Labs. 

“Will other kits move in to fill the void left by [Blackhole]? Most definitely. When will we see this happen? It’s hard to say right now, but for every hacker arrested, there’s another who thinks he is skilled enough to avoid arrest and will take a shot at making their millions,” he added.

According to Chester Wisniewski, senior security advisor at Sophos, other exploits have actually already begun to fill that void. At the moment, the two most common exploit kits are Glazunov and Neutrino – though it is hard to account for who picked up the most business from Black Hole’s demise, he said.

Trend Micro security researcher Jonathan Leopando blogged underground forums are still digesting news of the arrest and what the long term impact may be.

“One particular area of concern in Russian underground forums is whether users of BHEK could face arrests themselves,” he blogged. “In particular, users who purchased BHEK directly from Paunch or his authorized resellers would be in Paunch’s database of clients, which is now presumably in the hands of law enforcement.”

Advertisement. Scroll to continue reading.

The use of exploit kits as an infection vector has been cyclical for some time, noted Andrew Brandt, director of threat research at Blue Coat Systems.

“In spam-delivered campaigns, we saw an uptick in the use of exploit kits in August and early September, then their use trailed off after about the 10th  [of October],” he said. “We saw a gradual increase in Kuluoz-style email with links that simply deliver a .zip file and some messages with the .zip file already attached.”

Elsewhere, exploit kits of many types remain in wide use on compromised websites, he said, and iframes and misdirection are being used to load the kit in the background while the victim surfs the Web.

“If the author of Black Hole sold the code, or had collaborators that were not apprehended, it is possibly that we could see the kit appear again in the future,” said Curt Wilson, ASERT senior research analyst for Arbor Networks. “There is also a possibility that the code may have leaked at some point, which could make that particular threat re-emerge. There is no shortage of exploit kits that can be rented or purchased in the underground, and threat actors are likely to have taken full advantage of the situation to encourage new customers to migrate from Black Hole to their particular exploit kit.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.