The RIG exploit kit (EK), currently one of the most popular crimekits infecting systems around the world, was recently observed in a campaign that potentially impacted millions of users, exposing them to the SmokeLoader (aka Dofoil) malware.
Now that the Angler EK is gone, other threats in the segment are trying to fill the void, and RIG is one of them, although the Neutrino EK appears to have taken the reign for the time being (albeit the overall EK traffic is only a fraction of what it once was). According to Forcepoint researchers, a recently observed RIG campaign has targeted the users of Sprashivai[.]ru, a Russian Q&A and social networking site.
The popular website has an estimated 20 million visitors per month, and it makes sense that RIG operators decided to attack it. Over the past couple of years, numerous high-profile sites were targeted by EKs through malvertising or other techniques, in an attempt to expose as many users as possible to the malware they were carrying.
In this instance, the website was compromised by an actor attempting to redirect users to RIG EK via an injected iFrame that loads the RIG EK loading page. Similar to other exploit kits, RIG attempts to leverage outdated, vulnerable software on targeted machines, in this case browser components such as the Adobe Flash Player plugin.
Should it find an exploitable vulnerability, RIG would drop the SmokeLoader malware and then execute it. The entire process is performed in the background, without alerting the user and without requiring interaction, as part of an infection technique called drive-by-download.
Forcepoint’s Nicholas Griffin reveals that RIG was attempting to exploit the CVE-2015-8651 vulnerability in Flash Player that Adobe patched in December last year, via an emergency patch. Apparently, the Russian website has been compromised at least on June 23, and continued to redirect users to the exploit kit on June 29, although the website was notified on the issue on June 27.
The SmokeLoader (aka Dofoil) backdoor, previously associated with the Retefe banking Trojan, is decrypted and executed on compromised machines after the RIG EK would drop a Nullsoft Installer System (NSIS) executable. The delivery method makes it difficult for anti-virus solutions to detect the attack, because NSIS files are legitimate and the scripting ability makes them extremely versatile.
The malware attempts to connect to its command and control server while also generating a large number of fake requests to legitimate websites.
SmokeLoader was mainly designed to download plug-ins that can perform various nefarious operations on the infected computers, ranging from credential stealers, click fraud components, and additional Trojan downloaders.
More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
