sb-au logo
Story image

Malicious exploit kit targeting Internet Explorer users, on global scale

Researchers at ESET have discovered a new exploit kit spreading through the internet via malicious ads on reputable websites with high traffic.

For the last two months, they’ve seen cybercriminals targeting users of Internet Explorer and scanning their computers for vulnerabilities in Flash Player.

Hackers have been attempting to remotely download and execute various types of malware through loophole exploits.

According to ESET, these newly identified attacks fall under the name ‘malvertising’ due to the distribution of their malicious code through advertising campaigns.

The malicious exploit kit is called “Stegano”, which refers to steganography – a technique ESET researchers say e-criminals use to hide parts of their malicious code in the pixels of an advertisements' banner images.

Once infected, malware of the cybercriminal’s choice is downloaded on to the victim’s computer and executed.

Nick FitzGerald, senior research Fellow at ESET, says the exploit kit reinforces the need to keep operating systems and application software fully patched and as up-to-date as possible.

“Aside from only targeting systems using specific web browsers and outdated Flash versions, Stegano expends extensive effort to avoid running on typical security researcher computers, whether virtual, sandbox or a standard “infectible” machine,” he says.

“This is all part of its plan to avoid initial detection and complicate ongoing monitoring and research, thereby increasing the profit for the cybercriminals behind this exploit kit.”

FitzGerald has three tips to help avoid these attacks:

  1. Check if you haven’t been infected by a malware by running a security update and patches.
  2. Change your login credentials and check for suspicious activity on some of your most sensitive accounts (e.g. fraudulent transactions in your online banking). 
  3. Ensure you have a proper security solution customised to your devices and user habits to prevent attacks.

“As Australian web visitors have been specifically targeted in recent Stegano malvertising campaigns, Australian internet users who are unsure of the automatic patching of their systems should check they have all the latest security patches installed and that their security software is properly updated and configured,” explains Fitzgerald.

“Users of security solutions other than ESET’s might wish to get a second opinion from the ESET Online Scanner.”

Story image
Fortinet: Hyperscaling networks? Hyperscale your security!
Jon McGettigan, Fortinet A/NZ Regional Director, explains why a broad, integrated and automated security fabric is the most effective strategy to protect users, apps and data in a hyperscaling environment.More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Software-based facial recognition in payments industry to dominate by 2025
There will be more than 1.4 billion users of facial recognition software used for payments alone in 2025, up from 671 million in 2020.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
Imperva unveils new data security platform built for cloud
"The cloud has revolutionised IT, offering organisations a strategic opportunity to rapidly pursue new market initiatives and adapt their operations in the face of new business challenges."More