Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

RIG Exploit Kit Used in Flash-Based Malvertising Campaign

Flash-based ads are being used by an advertising network to lure the visitors of various websites to a landing page that has been set up to distribute malware, Internet security firm Malwarebytes said on Thursday.

Flash-based ads are being used by an advertising network to lure the visitors of various websites to a landing page that has been set up to distribute malware, Internet security firm Malwarebytes said on Thursday.

According to the company, the malicious advertising (malvertising) campaign relies on ads created with Adobe Flash that have appeared on a popular adult website and on a site that offers free e-cards. A close analysis of the ad’s source code revealed that it was designed to trigger a malicious redirection when loaded by creating an iframe for a URL that’s on the same domain as the advertising server.

The landing page hosts the RIG exploit kit, which attempts to exploit Adobe Flash and Microsoft Silverlight vulnerabilities in order to push a piece of malware identified as Trojan.Agent.ED, Malwarebytes said.

In June, Cisco reported that cybercriminals had been using the RIG exploit kit, which surfaced on cybercrime forums in April, to deliver the file-encrypting ransomware Cryptowall via similar malvertising techniques.

In an effort to remain unnoticed, the ad network designed the Flash ads so that they don’t contain any malicious URLs, they don’t exploit any Flash vulnerabilities in order to work, and the URL they call is obfuscated. In addition, the attackers set in place certain checks to ensure that the redirection doesn’t occur on incompatible systems or debuggers. The redirection is triggered only on Windows systems with a screen resolution greater than 400×600 pixels, with ActiveX enabled, and only once per IP address.

“This particular ad may have been placed on a number of websites, big and small and leading to several thousand infections,” Malwarebytes senior security researcher Jerome Segura noted in a blog post published on Thursday.

Segura noted that the ad network, which uses fake registration details and hides behind CloudFlare, had been flagged as a rogue service by researchers in the past.

Advertisement. Scroll to continue reading.

Typically, ad networks and website owners earn a commission every time they lead a user to the advertised site. However, in this case, the website owner is unknowingly infecting its visitors’ computers with malicious software, while the ad network makes profit not only for impressions and clicks, but also for distributing malware.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...