New research from Cisco Systems shows the ‘Kyle and Stan’ malvertising network is much bigger than it first appeared.
In fact, it is nine times bigger.
Two weeks ago, Cisco’s Talos Security Intelligence and Research Group revealed the existence of the network, which was responsible for placing malicious advertisements on websites such as amazon.com, ads.yahoo.com, youtube.com and 70 other domains. What they found however, was just the beginning.
“The “Kyle and Stan” network is a highly sophisticated malvertising network,” blogged Armin Pelkmann, threat researcher with Cisco. “It leverages the enormous reach of well placed malicious advertisements on very well known websites in order to potentially reach millions of users. The goal is to infect Windows and Mac users alike with spyware, adware, and browser hijackers.”
According to Pelkmann, Cisco has now isolated 6,491 domains sharing the same infrastructure – more than nine times more than the previously reported 703 domains.
“We have observed and analyzed 31151 connections made to these domains,” he blogged. “This equals over 3 times the amount of connections previously observed. The increase in connections is most likely not proportional to the domains due to the fact that a long time that has passed since the initial attacks.”
The first attempts to spread malware, spyware and adware are dating back to January 2012, he wrote.
“The domains of the type kyle.mxp677.com, stan.mxp681.com and lpmxp47.com seem to have usually a relatively short lifespan until they get replaced,” he blogged. “The attacker seems to use them for a short while, burn them and move on to the subsequent number. Domains like megashre.info or file36.com seem to be used for a longer period and are still active.”
“Noteworthy is that the popular domain www.winrar.com is also part of these attackers network,” he continued. “The website is build to fool visitors into believing they are installing the popular compression tool WinRar, but instead they are downloading malware. This website exhibits a significant traffic load and is a good example on how the attackers behind this network are trying to fool users into installing their malware.
The malware droppers used in the campaign leverage “clever techniques and encryption” to ensure unique checksums to avoid detection, Pelkmann noted.
“The count of websites connected to the attacker’s infrastructure is now up to 6491 and is growing daily,” he wrote. “The fact that parts of this infrastructure date back to January 2012 is concerning, as it shows that the threat actors have been active for over 2 and a half years.”
In its 2014 Midyear report, Cisco called malvertising a “disruptor for the Internet economy.”
“Malvertising is becoming more prevalent, and adversaries are able to launch highly targeted campaigns,” the report notes. “A malvertiser who wants to target a specific population at a certain time—for example, soccer fans in Germany watching a World Cup match—can turn to a legitimate ad exchange to meet their objective.”
Last week, researchers with MalwareBytes reported that the websites of The Times of Israel and The Jerusalem Post were serving malicious advertisements that redirected victims to a page hosting the Nuclear Exploit kit.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Amazon Settles Ring Customer Spying Complaint
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Adobe Inviting Researchers to Private Bug Bounty Program
