anatomy of exploit kits

24
Sameer Patil ([email protected]) SecurityXploded

Upload: securityxploded

Post on 15-Jul-2015

1.269 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Anatomy of Exploit Kits

Sameer Patil

(sameerpatilmsgmailcom)

SecurityXploded

Exploit Kit Introduction

Phases

Exploits used

Access Filters

Detection

Analysis of exploits

Content

Fiesta

FlashPack

Magnitude

Rig

Nuclear

Angler

Sweet Orange

Neutrino

Exploit Kits

Exploit Kit Naming

Compromised site

Redirector

Landing page

Post-infection traffic

Phases

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 2: Anatomy of Exploit Kits

Exploit Kit Introduction

Phases

Exploits used

Access Filters

Detection

Analysis of exploits

Content

Fiesta

FlashPack

Magnitude

Rig

Nuclear

Angler

Sweet Orange

Neutrino

Exploit Kits

Exploit Kit Naming

Compromised site

Redirector

Landing page

Post-infection traffic

Phases

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 3: Anatomy of Exploit Kits

Fiesta

FlashPack

Magnitude

Rig

Nuclear

Angler

Sweet Orange

Neutrino

Exploit Kits

Exploit Kit Naming

Compromised site

Redirector

Landing page

Post-infection traffic

Phases

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 4: Anatomy of Exploit Kits

Exploit Kit Naming

Compromised site

Redirector

Landing page

Post-infection traffic

Phases

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 5: Anatomy of Exploit Kits

Compromised site

Redirector

Landing page

Post-infection traffic

Phases

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 6: Anatomy of Exploit Kits

LFI in RevSlider plugin of Wordpress

http[compromisedcom]wp-adminadmin-ajaxphpaction=revslider_show_imageampimg=wp-configphp

XSS in Simple Security Wordpress plugin CVE-2014-9570 http[compromisedcom]wp-

adminusersphppage=access_logampdatefilter=27223E3Cscript3Ealert28HACKED293Cscript3E

Drupal Sql Injection

CDN reference compromise (Eg Operation Poisoned Helmand)

Iframe Injectors

Compromised sites

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 7: Anatomy of Exploit Kits

wwwsoyentrepreneurcomassetsjsfuncionesCargajs

Compromised sites

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 8: Anatomy of Exploit Kits

wwwmediaorpicomjsscriptsjs

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 9: Anatomy of Exploit Kits

Redirector (Obfuscated)

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 10: Anatomy of Exploit Kits

It checks if Silverlight plugin is installed by creating the

following ActiveXObject object

ActiveXObject(AgControlAgControl)

The presence of Flash plugin is ensured by creating the following object

swfobjectembedSWF()

Antivirus detectionif( chavs(kl1sys) || chavs(tmciescsys) || chavs(tmtdisys) || chavs(tmactmonsys) || chavs(TMEBC32sys) || chavs(tmeextsys) ||chavs(tmconnsys) || chavs(tmevtmgrsys) ) exit()

Redirector (after deobfuscating)

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 11: Anatomy of Exploit Kits

Download from httpjxlpaianlarin malicious files

Landing Page

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 12: Anatomy of Exploit Kits

Banking Frauds

Spying

Information Stealing

Click Fraud activities

Post-Infection

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 13: Anatomy of Exploit Kits

IE- CVE-2014-0322(zero day) CVE-2014-0324(zero day) CVE-2014-6332 CVE-2013-2551 CVE-2013-3918 CVE-2013-7331

Java- CVE-2013-2460 CVE-2013-2465 CVE-2012-1723 CVE-2012-0507 CVE-2013-0422(zero day)

Flash- CVE-2014-8440 CVE-2014-0556 CVE-2014-0569 CVE-2014-0515 CVE-2014-8439 CVE-2014-0502(zero day) CVE-2015-(zero day)

Silverlight- CVE-2013-0074 CVE-2013-3896

PDF- CVE-2010-0188

Exploits used

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 14: Anatomy of Exploit Kits

Request with no referrer

Block IP addresses

Non-Windows traffic

User Agent access

Plugin-Detect scripts

URL blacklist checks

Access Filters

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 15: Anatomy of Exploit Kits

Obfuscation in JS

Signatures for specific CVEs

User Agent strings

URL patterns

ltdomaingtindexphpreq=mp3ampnum=37ampPHPSSESID=

ltdomaingtindexphpreq=swfampnum=8413ampPHPSSESID=

ltdomaingtindexphpreq=xapampPHPSSESID=

ltdomaingt1phpr

Detection

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 16: Anatomy of Exploit Kits

Java Exploit- CVE-2013-2465

Javascript deobfuscation

Demo

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 17: Anatomy of Exploit Kits

Vectorltintgt array of size 0x90 bytes

Vector size resized to 0 resulting in holes between vector objects

Vulnerability exploited

Memory Corruption

Spraying FileReference objects

Modify FileReference object function pointer table

cancel() is called -gt call to VirtualProtect()

Flash Exploit CVE-2014-0515

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 18: Anatomy of Exploit Kits

VectorltIntgt Object Memory Layout

Source HP security Blog

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 19: Anatomy of Exploit Kits

DPBG tool

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 20: Anatomy of Exploit Kits

CVE-2013-2465 Java Exploit

Java obfuscators

PixelBender Exploit

Malware donrsquot need Coffee

Malware Traffic Analysis

References

Thank You

Page 21: Anatomy of Exploit Kits

Thank You