SlideShare a Scribd company logo
1 of 63
Download to read offline
Session ID:
Session Classification:
Chris Astacio
Websense, Inc.
HT-W23
Intermediate
SHINING SOME LIGHT INTOTHE EVOLUTION OFTHE BLACKHOLE
VALUE OF CYBERCRIME
$12.5
billion
► What is an exploit kit?
► Collection of exploits targeting vulnerabilities in client
vulnerabilities, targeting browsers and programs triggered by
browser activity.
► Hacking for Dummies
► Past exploit kits
► Phoenix (PEK) dates back to 2007,Siberia, Mpack, IcePack, Neosploit,
Hierarchy
► Typically fluctuating in usage and volume
► Exploits and admin relatively static
► Effectiveness declines with patching
► Attack duration limited
WHAT IS AN EXPLOIT KIT?
► Top exploit families detected by Microsoft anti-malware
products in the second half of 2011 and first half of 2012, by
number of unique computers with detections, shaded
according to relative prevalence
WHAT IS AN EXPLOIT KIT?
► Blackhole
► Creators of the kit are suspected to be "HodLuM" and "
► Most prevalent on the web?
► Websense 65% of all exploit detections
► AVG - 91%
► Sophos - 28 %
► Microsoft Leads other exploit families in prevalence by factor of 2
WHAT IS BLACKHOLE?
► Typically fluctuating in usage and
volume
► Exploits and admin relatively static
► Effectiveness declines with
patching
► Attack duration limited
► Usage accelerating – “King of the
Kits”
► Exploits continually added and
admin interface updated
► Addition of exploits extends
window of effectiveness
► Attack duration extended
► Typical Kit ► Blackhole
► The customer licenses the Blackhole exploit kit from the authors and specifies
various options to customize the kit.
► A potential victim loads a compromised web page or opens a malicious link in a
spammed email.
► The compromised web page or malicious link in the spammed email sends the
user to a Blackhole exploit kit server's landing page.
► This landing page contains obfuscated JavaScript that determines what is on the
victim's computers and loads all exploits to which this computer is vulnerable
and sometimes a Java applet tag that loads a Java Trojan horse.
► If there is an exploit that is usable, the exploit loads and executes a payload on
the victim's computer and informs the Blackhole exploit kit server which exploit
was used to load the payload.
BLACKHOLE
WHERE NO LIGHT ESCAPES
► Prevalence and adoption
► How do they maintain dominance?
► Rental model
► Attack vectors (exploits)
► Attack success rates
WHERE NO LIGHT ESCAPES
► Obfuscation
► PHP protection
► AVChecker
► IP blocking
► Traffic Direction Script
(TDS)
► Revision history
► Blackhole 2.X
► New features
► What is next?
WHERE NO LIGHT ESCAPES
WHERE DO BLACKHOLES EXIST?
► Blackhole GEOIP
► 54% US
► 13.78% Russian Federation
► 6.22% Germany
► 6.4% Virgin Islands
► 2.51% Turkey
► 2.49% Poland
► While past kits were sold relatively indiscriminately,
Blackhole is primarily dispersed through a rental business
model.
► If you want the kit, for the most part, you will have to pay for
the use of the hosted kit for a specific duration.
► Rentals can be for a 24 hour, month or annual timeframe.
► Other licenses are also available.
ECONOMIC MODEL
► The pricing model for the first release of Blackhole
ECONOMIC MODEL
► Website compromises
ATTACKTYPES
► Script injections
► Mostly using injection campaign I call iFramer
ATTACKTYPES
► Strong similarities between iFramer code and Blackhole
code
► Similar code structures and sometimes the same algorithm used in
the obfuscation!!
ATTACKTYPES
► Email campaigns
► DHL, UPS, and CNN OH MY!
ATTACKTYPES
► Spam campaigns
ATTACKTYPES
►
ATTACKTYPES
► Rogue AV
ATTACKTYPES
► Online pharmacy/affiliates scams
ATTACKTYPES
► CVE-2006-0003 - Unspecified vulnerability in the RDS.Dataspace ActiveX
control in Microsoft Data Access Components (MDAC)
► CVE-2007-5659 - Multiple buffer overflows in Adobe Reader and Acrobat
8.1.1 and earlier
► CVE-2008-2992 - Adobe Reader "util.printf" Vulnerability
► CVE-2009-0927 - Stack-based buffer overflow in Adobe Reader and
Adobe Acrobat 9 (multiple versions) allows remote attackers to execute
arbitrary code
► CVE-2009-1671 - Java buffer overflows in the Deployment Toolkit
ActiveX control in "deploytk.dll"
► CVE-2009-4324 - Adobe Reader and Adobe Acrobat "util.printd"
Vulnerability
► CVE-2010-0188 - Adobe Acrobat Bundled Libtiff Integer Overflow
Vulnerability
► CVE-2010-0840 - Sun Java JRE Trusted Methods Chaining Remote Code
Execution Vulnerability
► CVE-2010-0842 - Java JRE MixerSequencer Invalid Array Index Remote
Code Execution Vulnerability
ATTACKVECTORS
EXPLOIT STATS PAGE
► A ranking of the most successful exploits used in the kit
ATTACK SUCCESS RATES
► Specific vulnerabilities
targeted by Blackhole
exploit kit by number of
unique computers reporting
detections.
ATTACK SUCCESS RATES
► Zeus
► Cridex
► Parfeit
► GameOver
► Flashback
► KillAV Trojan
► TDL
► ZeroAccess
► Anti-Spyware 2011
► Morto
► Poison Ivy
► GhostRAT
► NGRBot
► DNSChanger
► Monkif
► SpyEye
► Darkshell
► Nitol
► AV Live Platinum Security
MALWARE DELIVERY
► Types of payloads:
TDS = CROSS-PLATFORMTHREAT
MAIN STATS PAGE
HIDING INTHE DARK
► Blackhole authors
have attempted to
protect themselves
from the theft of their
code through a
number of means.
One of which is the
rental only model,
that allows them to
maintain hosting.
RENT (AS IS)
► PHP script protection with the ionCube encoder
► Prevents code stealing
► Hinders analysis
OBFUSCATION - PHP
► Configuration options for all the following parameters:
► Querystring parameters
► File paths (for payloads, exploit components)
► Redirect URLs
► Usernames, passwords
► MySQL backend
► Blacklisting/blocking
► Only hit any IP once
► Maintain IP blacklist
► Blacklist by referrer URL
► Import blacklisted ranges
► Auto update
BACK-END FUNCTIONALITY
► Management console provides statistical summary, breaking down
successful infections by:
► Exploit
► OS
► Country
► Affiliate/partner (responsible for directing user traffic to the exploit kit)
► Browser
► Targets a variety of client vulnerabilities
► AV scanning add-ons (through the use of two scanning services,
available as optional extras of course, this is business!)
► Advertisements for additional underground services
MANAGEMENT CONSOLE
► AntiVirus Check
► VirTest and Scan4you
AVOIDING AV
► IP Blacklisting
IP BLOCKING
► TDS (Traffic Direction Script)
► By browser
► By OS
► By geolocation
► By time
► By referrer
TDS
► TDS (Traffic Direction Script)
TDS
1st REQUEST
2nd REQUEST
INFECTED SITE
[ ----.com ]
REDIRECTOR 1
[ molo.tw ]
REDIRECTOR 2
[ rmi.tw ] [ mias.tw ]
[ ask.com ]
EXPLOIT SITE
► Historically, kits change their obfuscation techniques only
on version releases
► Blackhole seems to change its obfuscation, on average, every two
months!
OBFUSCATION -TIMELINE
December 2010
February 2011
March 2011 Changed 3 times!
April 2011
July 2011
September 2011
December 2011
February 2012
May 2012
June 2012
October 2012
MANAGEMENT CONSOLE (PDAs)
MANAGEMENT CONSOLE (WEB)
A NEW EVENT HORIZON
HISTORY OF REVISION RELEASES
Version Release
1.0 August 2010
1.0.2 November 2010
1.1.0 June 2011
1.2.0 November 2011
1.2.1 December 2011
1.2.2 February 2012
1.2.3 March 2012
1.2.4 July 2012
2.0 September 2012
► Released September 12, 2012
Version 2.X
► There is reused code from 1.x version to 2.x version but 2.x is
meant to be more efficient.
CLEAR CODE 1.XVS 2.X
► New rates:
BUY 2 GET ONE FREE!
► How is your Russian?
► New rates:
► Rent on our server:
► Day rental - $50 (limit traffic 50k hits)
► Week rental - $200 (limit traffic 70k hits a day)
► Month rental - $500 (limit traffic 70k hits a day) if needed, traffic limit can
be raised for the additional fee
► The license for your server:
► License for 3 months $700
► The license for six months $1,000
► License for 1 year $1500
► Multidomain bundle version
► $200 one-time fee for the duration of the license (not binding to the
domain and the ip)
► Change of the domain on the standard bundle version - $20
BUY 2 GET ONE FREE!
MANAGEMENT CONSOLE
► New features:
► Updated admin tools
► Short-term URLs - random-domain generation feature
► a dynamic URL, which is valid for a few seconds, you need
only to one victim at a time
► Software Version - determines which versions of Java or Acrobat
Reader are running on client
► is very useful for evaluating the quality of traffic and to monitor the
the right version of the plugin
► Prevent direct download of executable payloads
► Only load exploit contents when client is considered vulnerable
► the plug is not vulnerable, exploits not issued, and not get in
detection loop
ALL NEW FEATURES
► Drop use of PluginDetect library
►
► Remove some old exploits (leaving Java atomic & byte, PDF
LibTIFF, MDAC)
► Update machine stats to include Windows 8 and mobile
devices
► order to see how much of your traffic is mobile, and mobile
traffic, you can redirect to the appropriate affiliate
MORE!
► Improvements include several things designed to make it
harder for researchers to harvest content from the exploit
sites:
► Change from predictable url structure (filenames and querystring
parameter names)
► Improved checking of referrer
► Ban unnecessary referrers
► Block bots
► Block TOR traffic
IMPROVED EVASION
MANAGEMENT CONSOLE
► Bot Blocking
OBFUSCATION IP &ToR BLOCKING
► ToR Blocking
OBFUSCATION IP RECORDING
► Making a better Blackhole
► Defalt IP block list containing ToR
nodes and research IP
► Continues to collect after the
campaign assuming traffic is
exclusively researchers
►
put the record mode, and all
reversers and bots that run on
► Java Run-Time Environment 0-day
vulnerability (CVE-2012-4681) was
actually first discovered in a kit.
(Gondad).
► Incorporated into Blackhole within
a week.
COMESWITH A 0-DAY BONUS!
► The Blackhole kit owners quickly
incorporated the Java Run-Time
Environment vulnerability (CVE-
2013-0422).
COMESWITH A 0-DAY BONUS!
► It took them one day to do it.
► Remember the rental costs?
► Compare to (estimated) price of zero day:
COMESWITH A 0-DAY BONUS!
INTOTHE SINGULARITY
► The future of Blackhole
► Ongoing updates to obfuscation
► Zero Day integration
► Two in three months time
► From POC
► Purchased from market
► Evolution of premium kits
GRAVITATIONAL COLLAPSE
We are setting aside a $100K budget to purchase browser and browser plug-in
vulnerabilities, which are going to be used exclusively by us, without being released to
public (not counting the situations, when a vulnerability is made public not because of
us).
Not only do we purchase weaponized (ready) exploits, but also their descriptions and
proof of concepts (with subsequent joint work with our specialists).
► Is Cool the next Blackhole?
► Same developer?
ABSOLUTE ZERO F
CVE-2011-3402
CVE-2012-5076
CVE-2011-3402
CVE-2012-5076
Paunch acknowledged being
responsible for the Cool kit, and
said his new exploit framework
costs a whopping $10,000 a
month. – Krebs on Security, Brian
Krebs
CIRCLETHEN MERGE
► From Redkit to CritXpack, success in the
underground markets seems to be spawning the
opportunity for others to create their own kits.
MOBILE EXCLUSIVE KIT?
Android
Blackberry
iOS
Symbian
Windows 8
► Most prevalent threats to desktop environments are mass
attacks, typically over the web
► Attacks such as exploit kits occur all the time and typically use old
exploits with success!
► Windows is most targeted platform due to popularity
► The growth of mobile devices will make mass mobile attacks
a natural progression
► Multiple versions of Android in the market is a larger attack surface
for old vulnerabilities!
► Rooted devices may not need privilege escalation
MASS MOBILE COMPROMISES
MASS MOBILE COMPROMISES
THANKYOU!

More Related Content

Viewers also liked

Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваSelectedPresentations
 
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALI
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALIPICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALI
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALISimona Riitano
 
Уральский форум за 15 минут
Уральский форум за 15 минутУральский форум за 15 минут
Уральский форум за 15 минутSelectedPresentations
 
Защита от направленных атак
Защита от направленных атакЗащита от направленных атак
Защита от направленных атакSelectedPresentations
 
Docker based Architecture by Denys Serdiuk
Docker based Architecture by Denys SerdiukDocker based Architecture by Denys Serdiuk
Docker based Architecture by Denys SerdiukLohika_Odessa_TechTalks
 
Speaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitSpeaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitLarisa Mueller
 
SparkSpark in the Big Data dark by Sergey Levandovskiy
SparkSpark in the Big Data dark by Sergey Levandovskiy  SparkSpark in the Big Data dark by Sergey Levandovskiy
SparkSpark in the Big Data dark by Sergey Levandovskiy Lohika_Odessa_TechTalks
 
Burnout and how to avoid it in your team. Responsible person's issue by Andre...
Burnout and how to avoid it in your team. Responsible person's issue by Andre...Burnout and how to avoid it in your team. Responsible person's issue by Andre...
Burnout and how to avoid it in your team. Responsible person's issue by Andre...Lohika_Odessa_TechTalks
 
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...SelectedPresentations
 
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f..." Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...Lohika_Odessa_TechTalks
 
Developing Rest services with SailsJs by Andrey Kolodnitskiy
Developing Rest services with SailsJs by Andrey KolodnitskiyDeveloping Rest services with SailsJs by Andrey Kolodnitskiy
Developing Rest services with SailsJs by Andrey KolodnitskiyLohika_Odessa_TechTalks
 
Performance evaluation process as a way to empower your employees and help th...
Performance evaluation process as a way to empower your employees and help th...Performance evaluation process as a way to empower your employees and help th...
Performance evaluation process as a way to empower your employees and help th...Lohika_Odessa_TechTalks
 
JavaScript Design Patterns overview by Ksenia Redunova
JavaScript Design Patterns overview by Ksenia RedunovaJavaScript Design Patterns overview by Ksenia Redunova
JavaScript Design Patterns overview by Ksenia RedunovaLohika_Odessa_TechTalks
 
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalks
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalksSelenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalks
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalksLohika_Odessa_TechTalks
 
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te..."WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...Lohika_Odessa_TechTalks
 

Viewers also liked (19)

Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
 
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALI
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALIPICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALI
PICCOLA BROCHURE TIME EVENTI LUOGHI SPECIALI
 
Уральский форум за 15 минут
Уральский форум за 15 минутУральский форум за 15 минут
Уральский форум за 15 минут
 
Защита от направленных атак
Защита от направленных атакЗащита от направленных атак
Защита от направленных атак
 
Spo1 w25 spo1-w25
Spo1 w25 spo1-w25Spo1 w25 spo1-w25
Spo1 w25 spo1-w25
 
Docker based Architecture by Denys Serdiuk
Docker based Architecture by Denys SerdiukDocker based Architecture by Denys Serdiuk
Docker based Architecture by Denys Serdiuk
 
Hta r35
Hta r35Hta r35
Hta r35
 
Speaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitSpeaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_Summit
 
RESUME
RESUMERESUME
RESUME
 
SparkSpark in the Big Data dark by Sergey Levandovskiy
SparkSpark in the Big Data dark by Sergey Levandovskiy  SparkSpark in the Big Data dark by Sergey Levandovskiy
SparkSpark in the Big Data dark by Sergey Levandovskiy
 
Burnout and how to avoid it in your team. Responsible person's issue by Andre...
Burnout and how to avoid it in your team. Responsible person's issue by Andre...Burnout and how to avoid it in your team. Responsible person's issue by Andre...
Burnout and how to avoid it in your team. Responsible person's issue by Andre...
 
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...
Между регуляторами и потребителями — жизнь в пограничном слое. Практический о...
 
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f..." Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
 
Developing Rest services with SailsJs by Andrey Kolodnitskiy
Developing Rest services with SailsJs by Andrey KolodnitskiyDeveloping Rest services with SailsJs by Andrey Kolodnitskiy
Developing Rest services with SailsJs by Andrey Kolodnitskiy
 
Performance evaluation process as a way to empower your employees and help th...
Performance evaluation process as a way to empower your employees and help th...Performance evaluation process as a way to empower your employees and help th...
Performance evaluation process as a way to empower your employees and help th...
 
JavaScript Design Patterns overview by Ksenia Redunova
JavaScript Design Patterns overview by Ksenia RedunovaJavaScript Design Patterns overview by Ksenia Redunova
JavaScript Design Patterns overview by Ksenia Redunova
 
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalks
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalksSelenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalks
Selenium with py test by Alexandr Vasyliev for Lohika Odessa Python TechTalks
 
Tech w21
Tech w21Tech w21
Tech w21
 
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te..."WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...
"WEB applications security testing" by Kirill Semenov for Lohika Odessa QA Te...
 

Similar to Ht w23

CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
 
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007ClubHack
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryonePaul Melson
 
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP EcosystemWhat is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP Ecosystemsparkfabrik
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisChong-Kuan Chen
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterAbdessabour Arous
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...YaJUG
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App Cenzic
 
Hacktivity2011 be ef-preso_micheleorru
Hacktivity2011 be ef-preso_micheleorruHacktivity2011 be ef-preso_micheleorru
Hacktivity2011 be ef-preso_micheleorruMichele Orru
 
Top ten integration productivity tools and frameworks - Integration Saturday ...
Top ten integration productivity tools and frameworks - Integration Saturday ...Top ten integration productivity tools and frameworks - Integration Saturday ...
Top ten integration productivity tools and frameworks - Integration Saturday ...Nikolai Blackie
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Codeguest66dc5f
 

Similar to Ht w23 (20)

Stu t19 a
Stu t19 aStu t19 a
Stu t19 a
 
Spo2 w22
Spo2 w22Spo2 w22
Spo2 w22
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
 
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP EcosystemWhat is the Secure Supply Chain and the Current State of the PHP Ecosystem
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse Center
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
 
Hacktivity2011 be ef-preso_micheleorru
Hacktivity2011 be ef-preso_micheleorruHacktivity2011 be ef-preso_micheleorru
Hacktivity2011 be ef-preso_micheleorru
 
Top ten integration productivity tools and frameworks - Integration Saturday ...
Top ten integration productivity tools and frameworks - Integration Saturday ...Top ten integration productivity tools and frameworks - Integration Saturday ...
Top ten integration productivity tools and frameworks - Integration Saturday ...
 
Buffer overflows
Buffer overflowsBuffer overflows
Buffer overflows
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 

More from SelectedPresentations

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияSelectedPresentations
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.SelectedPresentations
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийSelectedPresentations
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройствSelectedPresentations
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...SelectedPresentations
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиSelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...SelectedPresentations
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...SelectedPresentations
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхSelectedPresentations
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...SelectedPresentations
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСSelectedPresentations
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБSelectedPresentations
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийSelectedPresentations
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...SelectedPresentations
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...SelectedPresentations
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИSelectedPresentations
 

More from SelectedPresentations (20)

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
 
Exp r35
Exp r35Exp r35
Exp r35
 

Ht w23

  • 1. Session ID: Session Classification: Chris Astacio Websense, Inc. HT-W23 Intermediate SHINING SOME LIGHT INTOTHE EVOLUTION OFTHE BLACKHOLE
  • 3. ► What is an exploit kit? ► Collection of exploits targeting vulnerabilities in client vulnerabilities, targeting browsers and programs triggered by browser activity. ► Hacking for Dummies ► Past exploit kits ► Phoenix (PEK) dates back to 2007,Siberia, Mpack, IcePack, Neosploit, Hierarchy ► Typically fluctuating in usage and volume ► Exploits and admin relatively static ► Effectiveness declines with patching ► Attack duration limited WHAT IS AN EXPLOIT KIT?
  • 4. ► Top exploit families detected by Microsoft anti-malware products in the second half of 2011 and first half of 2012, by number of unique computers with detections, shaded according to relative prevalence WHAT IS AN EXPLOIT KIT?
  • 5. ► Blackhole ► Creators of the kit are suspected to be "HodLuM" and " ► Most prevalent on the web? ► Websense 65% of all exploit detections ► AVG - 91% ► Sophos - 28 % ► Microsoft Leads other exploit families in prevalence by factor of 2 WHAT IS BLACKHOLE? ► Typically fluctuating in usage and volume ► Exploits and admin relatively static ► Effectiveness declines with patching ► Attack duration limited ► Usage accelerating – “King of the Kits” ► Exploits continually added and admin interface updated ► Addition of exploits extends window of effectiveness ► Attack duration extended ► Typical Kit ► Blackhole
  • 6. ► The customer licenses the Blackhole exploit kit from the authors and specifies various options to customize the kit. ► A potential victim loads a compromised web page or opens a malicious link in a spammed email. ► The compromised web page or malicious link in the spammed email sends the user to a Blackhole exploit kit server's landing page. ► This landing page contains obfuscated JavaScript that determines what is on the victim's computers and loads all exploits to which this computer is vulnerable and sometimes a Java applet tag that loads a Java Trojan horse. ► If there is an exploit that is usable, the exploit loads and executes a payload on the victim's computer and informs the Blackhole exploit kit server which exploit was used to load the payload. BLACKHOLE
  • 7. WHERE NO LIGHT ESCAPES
  • 8. ► Prevalence and adoption ► How do they maintain dominance? ► Rental model ► Attack vectors (exploits) ► Attack success rates WHERE NO LIGHT ESCAPES
  • 9. ► Obfuscation ► PHP protection ► AVChecker ► IP blocking ► Traffic Direction Script (TDS) ► Revision history ► Blackhole 2.X ► New features ► What is next? WHERE NO LIGHT ESCAPES
  • 10. WHERE DO BLACKHOLES EXIST? ► Blackhole GEOIP ► 54% US ► 13.78% Russian Federation ► 6.22% Germany ► 6.4% Virgin Islands ► 2.51% Turkey ► 2.49% Poland
  • 11. ► While past kits were sold relatively indiscriminately, Blackhole is primarily dispersed through a rental business model. ► If you want the kit, for the most part, you will have to pay for the use of the hosted kit for a specific duration. ► Rentals can be for a 24 hour, month or annual timeframe. ► Other licenses are also available. ECONOMIC MODEL
  • 12. ► The pricing model for the first release of Blackhole ECONOMIC MODEL
  • 14. ► Script injections ► Mostly using injection campaign I call iFramer ATTACKTYPES
  • 15. ► Strong similarities between iFramer code and Blackhole code ► Similar code structures and sometimes the same algorithm used in the obfuscation!! ATTACKTYPES
  • 16. ► Email campaigns ► DHL, UPS, and CNN OH MY! ATTACKTYPES
  • 20. ► Online pharmacy/affiliates scams ATTACKTYPES
  • 21. ► CVE-2006-0003 - Unspecified vulnerability in the RDS.Dataspace ActiveX control in Microsoft Data Access Components (MDAC) ► CVE-2007-5659 - Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier ► CVE-2008-2992 - Adobe Reader "util.printf" Vulnerability ► CVE-2009-0927 - Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 (multiple versions) allows remote attackers to execute arbitrary code ► CVE-2009-1671 - Java buffer overflows in the Deployment Toolkit ActiveX control in "deploytk.dll" ► CVE-2009-4324 - Adobe Reader and Adobe Acrobat "util.printd" Vulnerability ► CVE-2010-0188 - Adobe Acrobat Bundled Libtiff Integer Overflow Vulnerability ► CVE-2010-0840 - Sun Java JRE Trusted Methods Chaining Remote Code Execution Vulnerability ► CVE-2010-0842 - Java JRE MixerSequencer Invalid Array Index Remote Code Execution Vulnerability ATTACKVECTORS
  • 23. ► A ranking of the most successful exploits used in the kit ATTACK SUCCESS RATES
  • 24. ► Specific vulnerabilities targeted by Blackhole exploit kit by number of unique computers reporting detections. ATTACK SUCCESS RATES
  • 25. ► Zeus ► Cridex ► Parfeit ► GameOver ► Flashback ► KillAV Trojan ► TDL ► ZeroAccess ► Anti-Spyware 2011 ► Morto ► Poison Ivy ► GhostRAT ► NGRBot ► DNSChanger ► Monkif ► SpyEye ► Darkshell ► Nitol ► AV Live Platinum Security MALWARE DELIVERY ► Types of payloads:
  • 29. ► Blackhole authors have attempted to protect themselves from the theft of their code through a number of means. One of which is the rental only model, that allows them to maintain hosting. RENT (AS IS)
  • 30. ► PHP script protection with the ionCube encoder ► Prevents code stealing ► Hinders analysis OBFUSCATION - PHP
  • 31. ► Configuration options for all the following parameters: ► Querystring parameters ► File paths (for payloads, exploit components) ► Redirect URLs ► Usernames, passwords ► MySQL backend ► Blacklisting/blocking ► Only hit any IP once ► Maintain IP blacklist ► Blacklist by referrer URL ► Import blacklisted ranges ► Auto update BACK-END FUNCTIONALITY
  • 32. ► Management console provides statistical summary, breaking down successful infections by: ► Exploit ► OS ► Country ► Affiliate/partner (responsible for directing user traffic to the exploit kit) ► Browser ► Targets a variety of client vulnerabilities ► AV scanning add-ons (through the use of two scanning services, available as optional extras of course, this is business!) ► Advertisements for additional underground services MANAGEMENT CONSOLE
  • 33. ► AntiVirus Check ► VirTest and Scan4you AVOIDING AV
  • 35. ► TDS (Traffic Direction Script) ► By browser ► By OS ► By geolocation ► By time ► By referrer TDS
  • 36. ► TDS (Traffic Direction Script) TDS 1st REQUEST 2nd REQUEST INFECTED SITE [ ----.com ] REDIRECTOR 1 [ molo.tw ] REDIRECTOR 2 [ rmi.tw ] [ mias.tw ] [ ask.com ] EXPLOIT SITE
  • 37. ► Historically, kits change their obfuscation techniques only on version releases ► Blackhole seems to change its obfuscation, on average, every two months! OBFUSCATION -TIMELINE December 2010 February 2011 March 2011 Changed 3 times! April 2011 July 2011 September 2011 December 2011 February 2012 May 2012 June 2012 October 2012
  • 40. A NEW EVENT HORIZON
  • 41. HISTORY OF REVISION RELEASES Version Release 1.0 August 2010 1.0.2 November 2010 1.1.0 June 2011 1.2.0 November 2011 1.2.1 December 2011 1.2.2 February 2012 1.2.3 March 2012 1.2.4 July 2012 2.0 September 2012
  • 42. ► Released September 12, 2012 Version 2.X
  • 43. ► There is reused code from 1.x version to 2.x version but 2.x is meant to be more efficient. CLEAR CODE 1.XVS 2.X
  • 44. ► New rates: BUY 2 GET ONE FREE! ► How is your Russian?
  • 45. ► New rates: ► Rent on our server: ► Day rental - $50 (limit traffic 50k hits) ► Week rental - $200 (limit traffic 70k hits a day) ► Month rental - $500 (limit traffic 70k hits a day) if needed, traffic limit can be raised for the additional fee ► The license for your server: ► License for 3 months $700 ► The license for six months $1,000 ► License for 1 year $1500 ► Multidomain bundle version ► $200 one-time fee for the duration of the license (not binding to the domain and the ip) ► Change of the domain on the standard bundle version - $20 BUY 2 GET ONE FREE!
  • 47. ► New features: ► Updated admin tools ► Short-term URLs - random-domain generation feature ► a dynamic URL, which is valid for a few seconds, you need only to one victim at a time ► Software Version - determines which versions of Java or Acrobat Reader are running on client ► is very useful for evaluating the quality of traffic and to monitor the the right version of the plugin ► Prevent direct download of executable payloads ► Only load exploit contents when client is considered vulnerable ► the plug is not vulnerable, exploits not issued, and not get in detection loop ALL NEW FEATURES
  • 48. ► Drop use of PluginDetect library ► ► Remove some old exploits (leaving Java atomic & byte, PDF LibTIFF, MDAC) ► Update machine stats to include Windows 8 and mobile devices ► order to see how much of your traffic is mobile, and mobile traffic, you can redirect to the appropriate affiliate MORE!
  • 49. ► Improvements include several things designed to make it harder for researchers to harvest content from the exploit sites: ► Change from predictable url structure (filenames and querystring parameter names) ► Improved checking of referrer ► Ban unnecessary referrers ► Block bots ► Block TOR traffic IMPROVED EVASION
  • 51. ► Bot Blocking OBFUSCATION IP &ToR BLOCKING ► ToR Blocking
  • 52. OBFUSCATION IP RECORDING ► Making a better Blackhole ► Defalt IP block list containing ToR nodes and research IP ► Continues to collect after the campaign assuming traffic is exclusively researchers ► put the record mode, and all reversers and bots that run on
  • 53. ► Java Run-Time Environment 0-day vulnerability (CVE-2012-4681) was actually first discovered in a kit. (Gondad). ► Incorporated into Blackhole within a week. COMESWITH A 0-DAY BONUS!
  • 54. ► The Blackhole kit owners quickly incorporated the Java Run-Time Environment vulnerability (CVE- 2013-0422). COMESWITH A 0-DAY BONUS! ► It took them one day to do it.
  • 55. ► Remember the rental costs? ► Compare to (estimated) price of zero day: COMESWITH A 0-DAY BONUS!
  • 57. ► The future of Blackhole ► Ongoing updates to obfuscation ► Zero Day integration ► Two in three months time ► From POC ► Purchased from market ► Evolution of premium kits GRAVITATIONAL COLLAPSE We are setting aside a $100K budget to purchase browser and browser plug-in vulnerabilities, which are going to be used exclusively by us, without being released to public (not counting the situations, when a vulnerability is made public not because of us). Not only do we purchase weaponized (ready) exploits, but also their descriptions and proof of concepts (with subsequent joint work with our specialists).
  • 58. ► Is Cool the next Blackhole? ► Same developer? ABSOLUTE ZERO F CVE-2011-3402 CVE-2012-5076 CVE-2011-3402 CVE-2012-5076 Paunch acknowledged being responsible for the Cool kit, and said his new exploit framework costs a whopping $10,000 a month. – Krebs on Security, Brian Krebs
  • 59. CIRCLETHEN MERGE ► From Redkit to CritXpack, success in the underground markets seems to be spawning the opportunity for others to create their own kits.
  • 61. ► Most prevalent threats to desktop environments are mass attacks, typically over the web ► Attacks such as exploit kits occur all the time and typically use old exploits with success! ► Windows is most targeted platform due to popularity ► The growth of mobile devices will make mass mobile attacks a natural progression ► Multiple versions of Android in the market is a larger attack surface for old vulnerabilities! ► Rooted devices may not need privilege escalation MASS MOBILE COMPROMISES