Work in progress | xxxWork in progress – xxx
菜单

Work in progress

八月 6, 2019 - BleepingComputer

Work in progress

A new kit for web-based attacks calling itself Lord EK has been spotted at the beginning of the month as part of a malvertising chain that uses the PopCash ad network.

The exploit kit (EK) leverages a use-after-free vulnerability in Adobe Flash and relies on the ngrok service that can set up a secure connection to expose to the internet local servers behind NATs and firewalls.

Work in progress

Discovered by Virus Bulletin researcher Adrian Luca at a time when it was still under development, Lord EK was named so because of a landing page that carried this tag.

Work in progress
source

The kit’s initial payload was njRAT, an old remote access trojan with early variants traced to November 2012 and preferred by Nigerian scammers running business email compromise (BEC) attacks.

A researcher noticed that Lord EK then switched to version 2.0.3 of ERIS, a piece of ransomware delivered in the past by other exploit kits such as RIG and Azera.

According to research from Jérôme Segura of Malwarebytes, the kit uses a compromised website for redirecting to a landing page and it is part of a malvertising chain that uses the PopCash ad network.

The exploit is pushed by a function that first checks for the presence of Flash Player and its version. The second part of the code in the landing page gathers details about the Flash version used on the host ad geo-location attributes about the victim.

Work in progress

The vulnerability was used as a zero-day in an APT attack against the Russian FSBI “Polyclinic #2” medical clinic. Adobe patched it in December 2018 but the exploit was quickly adopted by multiple exploit kits, including Spelevo.

After exploitation, Lord EK redirects the victim to the Google home page, Segura notes, adding that this behavior was also observed with Spelevo.

With Flash set to die at the end of 2020, exploit kits may soon dwindle into extinction themselves. However, the author of Lord EK seems to be actively tweaking the kit, says Segura.

“Even though the vulnerabilities for Internet Explorer and Flash Player have been patched and both have a very small market share, usage of the old Microsoft browser still continues in many countries.” – Jérôme Segura

Related Articles:

Ransomware: Most Popular Malware in Underground Forums

Rig Exploit Kit Pushing Eris Ransomware in Drive-by Downloads

New Exploit Kit Spelevo Carries Bag of Old Tricks

Sodinokibi Ransomware Now Pushed by Exploit Kits and Malvertising

ECh0raix Ransomware Decryptor Restores QNAP Files For Free

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51