Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Exploit for Recently Patched Flash Flaw Added to Magnitude, Neutrino, Nuclear Pack

Just days after the developers of the Angler exploit kit started leveraging a recently patched Flash Player vulnerability to distribute malware, an exploit for the same security bug was also added to the Magnitude, Neutrino and Nuclear Pack exploit kits.

Just days after the developers of the Angler exploit kit started leveraging a recently patched Flash Player vulnerability to distribute malware, an exploit for the same security bug was also added to the Magnitude, Neutrino and Nuclear Pack exploit kits.

FireEye and the French researcher known as Kafeine noticed last week that an exploit for the memory corruption (CVE-2015-3090) vulnerability discovered by Chris Evans of Google Project Zero was added to Angler. The exploit was included on May 26, just two weeks after Adobe patched the flaw with the release of Flash Player 17.0.0.188.

On May 29, Kafeine reported that an exploit for the same vulnerability was also added to Nuclear Pack and Magnitude. On Monday, June 1, the researcher noticed that the flaw had also been exploited by the Neutrino exploit kit.

In the instances observed by Kafeine, Nuclear Pack and Neutrino were exploiting the flaw to push a variant of the Andromeda malware. Magnitude had been using it to deliver the notorious CryptoWall ransomware, the expert said in a blog post.

It’s unclear how the developers of all these exploit kits obtained the exploit for this particular Flash Player vulnerability, but there are several possibilities. Some of them are known to buy exploits from other exploit kit authors, Kafeine told SecurityWeek.

The authors of different exploit kits are usually in competition with each other so they don’t usually share exploits, explained Yonathan Klijnsma, a Fox-IT threat intelligence analyst who often analyzes exploit kits in his spare time.

“What usually happens is that they get samples from each others’ exploit kit and take it apart, reverse it if you will. After reversing it they implement it for their own kit. There’s clear examples documented by Kafeine also on cases where bad copy/paste jobs by authors broke their infection chain because the exploit became unstable/non-functional,” Klijnsma told SecurityWeek.

When an exploit for a recently fixed vulnerability is first added to an exploit kit, in most cases the developers create the exploit by reverse engineering the patch, said Klijnsma.

Advertisement. Scroll to continue reading.

The Angler exploit kit has made numerous headlines over the past period because its developers have used exploits for Flash Player zero-day vulnerabilities.

“In instances where Angler runs with 0day exploits it usually means either of two things: they have a skilled RE in their team or they have the budget to buy these exploits from the market,” Klijnsma noted. “There are documented cases of certain actors announcing their ‘spending budget’ to exploit creators saying ‘hey I can buy your goods, show me something’.”

In a blog post published last week, researchers at Palo Alto Networks noted that exploit kit authors previously focused on out-of-bounds access (OBA) vulnerabilities in Flash Player because they are easier to exploit. However, they have increasingly started leveraging use-after-free (UAF) vulnerabilities, which are a type of memory corruption flaw.

The security firm spotted recently patched Adobe Flash Player UAF vulnerabilities such as CVE-2015-0311, CVE-2015-0313 and CVE-2015-0359 being added to various exploit kits, including Flash EK, Sweet Orange, Fiesta, Angler and Neutrino.

“Due to certain features in Adobe Flash, specifically the ability for alchemy opcodes (such as op_li32/op_si32) to directly access memory within a ByteArray, use-after-free vulnerabilities are just as easy to exploit as out-of-bounds vulnerabilities,” Palo Alto Networks wrote in a blog post. “It appears that the authors of exploit kits agree with this, as they continue to add new Flash UAF vulnerabilities to their arsenal. As such, we can anticipate Flash vulnerabilities will continue to be exploited by exploit kits well into the future.”

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.