Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Nuclear EK Gate Uses Decoy CloudFlare DDoS Check Page

A fake CloudFlare DDoS (distributed denial of service) check page is being used by a Nuclear exploit kit (EK) gate to load a malicious redirection page to serve malware, according to security firm Malwarebytes.

A fake CloudFlare DDoS (distributed denial of service) check page is being used by a Nuclear exploit kit (EK) gate to load a malicious redirection page to serve malware, according to security firm Malwarebytes.

CloudFlare is a well-known cloud security provider that offers DDoS protection along with several other services to website owners. CloudFlare filters DNS requests through its infrastructure to protect websites from attacks and provide faster page delivery times.

In a recent blog post, Malwarebytes’ Jérôme Segura explains that there have been several malvertising attacks that have been redirecting users to a rogue domain which appears to be using CloudFlare, but is actually serving the Nuclear EK instead. However, a closer inspection revealed that the server’s IP address does not belong to CloudFlare and that the domain is completely bogus.

The interesting part, however, is the fact that the cybercriminals are using a conditional malicious redirection that checks if the user is genuine. Next, the user is redirected to an intermediate site designed to further redirect the victim to the Nuclear EK, in addition to loading an ad banner and collecting an affiliate commission.

The attackers also rely on JavaScript in order to launch their exploit, and they even instruct users to “turn JavaScript on and reload the page.” 

The technique, however, might not return the expected results every time, and Malwarebytes researchers say they do not know why the threat actors are using the aforementioned redirection template.

CloudFlare has been already alerted on the matter and has confirmed that the bogus domain is in no way associated with the security firm.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.