“Double-compromised” website reveals importance of patching

Compromising a Web site is a common way for threat actors to either get into an organization or spread malware. Nor is it uncommon to find a site compromised by more than one exploit. But it is more unusual to find a site compromised by more than one campaign based on exploit kits.

That’s what Brad Duncan, a researcher for Paolo Alto Networks and a contributor to the Internet Storm Center handler’s blog, found was tipped off to this week. He wrote about it in a blog here, which also includes a warning to infosec pros on the need to constantly patch sites they administer.

“In this case you have two different actors that established separate campaigns and they use exploit kits to deliver a particular payload,” Duncan said in an interview Thursday.

The site, with a .tr (Turkey) suffix, had injected script from both the pseudo-Darkleech campaign (leading to a server delivering Neutrino exploit kit, which in turn carries the CrypMIC ransomware) the and the EITest campaign (which led to the Rig exploit kit and then to a possible variant of the Vawtrak banking malware).

“I’ve never seen both infections at the same time,” Duncan writes in his blog. “Injected script from the pseudo-Darkleech campaign tends to prevent injected script by other campaigns from running.”

Use of the Rig exploit kit by the EITest campaign is relatively recent, he says. After the Angler EK was taken down earlier this year, the EITest campaign used the Neutrino kit.

While a Web site that can be compromised once can be infected again, it’s not likely that criminal groups are co-operating. It just looks that way.

The lesson for infosec pros is if you’re not making sure your servers are fully patched and up to date they will at some point get compromised and used for malware campaigns, says Duncan.

“Properly administered Windows hosts following best security practices (up-to-date applications, latest operating system patches, software restriction policies, etc) should not be infected when running across these campaigns,” he concludes.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now