Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

The Internet’s Big Threat: Drive-by Attacks

Remember the days when security awareness programs only had to warn employees about website spoofing? Unfortunately, cyber-attack methods have advanced to the point where even trusted, well-known websites can silently infect users via drive-by download attacks. Last year’s NBC.com incident is a good example of this growing Internet threat.

Remember the days when security awareness programs only had to warn employees about website spoofing? Unfortunately, cyber-attack methods have advanced to the point where even trusted, well-known websites can silently infect users via drive-by download attacks. Last year’s NBC.com incident is a good example of this growing Internet threat.

The surge in spear-phishing as the top method used by cybercriminals to gain unauthorized access to sensitive data has led to widespread implementation of end user awareness programs.

To minimize cyber risks it is essential that every employee within an organization understand that they are both an asset and a potential security liability. After instituting these programs, odds are high that most employees will know not to open the email attachment from the Nigerian lawyer who claims they are the beneficiary of a large fortune or click on an email link purporting to be from their bank, asking them to confirm their access credentials.

In the past, security awareness programs were simply required to focus on email phishing and website spoofing threats, while providing best practices, such as:

• Don’t open attachments from people you don’t know;

• Don’t open attachments from people you know, but from whom you are not expecting to receive a particular type of file;

• Don’t follow website links from unknown email senders; and

• Check the naming convention of website links to assure that they are directing you to a legitimate site.

Advertisement. Scroll to continue reading.

Unfortunately, the attack on a variety of NBC websites last year proves that employees are no longer safe from drive-by malware threats when visiting reputable websites. In case of the NBC attack, cybercriminals had embedded invisible malicious elements across different websites belonging to the broadcaster. To avoid detection, these elements where periodically rotated. When a user clicked on them, it called on a RedKit to target the computer with up to three different exploit kits, including the Citadel crime ware toolkit, which is designed to steal financial information. The RedKit initially checked whether the user was running outdated versions of software or browser plug-ins. If it detected any outdated software, the vulnerability was exploited to install malicious software on the user’s computer.

These type of drive-by attacks are flourishing because exploit kits that allow cybercriminals to compromise websites are readily accessible on the black market. They are very sophisticated and automated, which makes it easy for cybercriminals to scale their attacks across as many web servers as possible. Furthermore, the growing complexity of browser environments adds to the spread of drive-by downloads. As the number of plug-ins, add-ons, and browser versions grow, there are more weaknesses for hackers to exploit and add to their kit.

As a result, users who are simply surfing the Internet can unknowingly stumble upon a compromised website, which may look completely normal. As a matter of fact, cyber-attackers often specifically target well-known and popular websites, since users trust that these websites are being kept free from malware.

In addition, many drive-by attacks are launched following the release of new security patches for common applications such as Acrobat and those than run on the Java platform. Once vendors release a patch, hackers use the information to reverse-engineer the fix, uncovering the underlying vulnerability, which they then target. As a consequence, users who don’t quickly update their software remain highly vulnerable to having their computer compromised by malware. This can of course lead to their personal identifiable information being stolen, activities recorded, and their computer becoming part of a botnet. Since many users fail to update the Java runtime environment installed on their computers, Java bugs remain quite popular and effective with cybercriminals.

Earlier this year, cybercriminals took drive-by attacks to the next level by front-ending their attack with robocalls. These automated phone calls urged victims to visit a leading North American wireless phone provider’s website to earn hundreds of dollars in rewards. Since the website had been compromised, even cautious users were victimized, leading to stolen access credentials and subsequently account takeovers.

So what can be done to minimize the risk of these new attack techniques?

Obviously, the fundamental best practices are to keep software on endpoints up to date and also disable Java, which is one of the most popular attack vector for many cybercriminals. Beyond these essential steps, organizations should extend their diagnostic efforts. The NBC hack proved that traditional perimeter security measures often do not protect against drive-by attacks. Post-mortem analysis of the attack showed that the particular version of Citadel which was used, was only recognized by three of the 46 antivirus programs available at the time on virustotal.com.

To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking. By doing so, however, it is possible to detect early indicators of an ongoing attack and take steps to mitigate the threat. Since drive-by attacks are only one of many attack techniques, payload data monitoring should be part of an organization’s continuous diagnostics program.

This implies an increased frequency of data assessments and requires security data automation by aggregating and normalizing data from a variety of sources such as security information and event management (SIEM), asset management, threat feeds, and vulnerability scanners. In turn, organizations can reduce costs by unifying solutions, streamlining processes, creating situational awareness to expose exploits and threats in a timely manner, and gathering historic trend data, which can assist in predictive security.

Written By

Dr. Torsten George is an internationally recognized IT security expert, author, and speaker with nearly 30 years of experience in the global IT security community. He regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege for Dummies book. Torsten has held executive level positions with Absolute Software, Centrify (now Delinea), RiskSense (acquired by Ivanti), RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global), Digital Link, and Everdream Corporation (acquired by Dell).

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.