Story image

Malicious exploit kit targeting Internet Explorer users, on global scale

12 Dec 16

Researchers at ESET have discovered a new exploit kit spreading through the internet via malicious ads on reputable websites with high traffic.

For the last two months, they’ve seen cybercriminals targeting users of Internet Explorer and scanning their computers for vulnerabilities in Flash Player.

Hackers have been attempting to remotely download and execute various types of malware through loophole exploits.

According to ESET, these newly identified attacks fall under the name ‘malvertising’ due to the distribution of their malicious code through advertising campaigns.

The malicious exploit kit is called “Stegano”, which refers to steganography – a technique ESET researchers say e-criminals use to hide parts of their malicious code in the pixels of an advertisements' banner images.

Once infected, malware of the cybercriminal’s choice is downloaded on to the victim’s computer and executed.

Nick FitzGerald, senior research Fellow at ESET, says the exploit kit reinforces the need to keep operating systems and application software fully patched and as up-to-date as possible.

“Aside from only targeting systems using specific web browsers and outdated Flash versions, Stegano expends extensive effort to avoid running on typical security researcher computers, whether virtual, sandbox or a standard “infectible” machine,” he says.

“This is all part of its plan to avoid initial detection and complicate ongoing monitoring and research, thereby increasing the profit for the cybercriminals behind this exploit kit.”

FitzGerald has three tips to help avoid these attacks:

  1. Check if you haven’t been infected by a malware by running a security update and patches.
  2. Change your login credentials and check for suspicious activity on some of your most sensitive accounts (e.g. fraudulent transactions in your online banking). 
  3. Ensure you have a proper security solution customised to your devices and user habits to prevent attacks.

“As Australian web visitors have been specifically targeted in recent Stegano malvertising campaigns, Australian internet users who are unsure of the automatic patching of their systems should check they have all the latest security patches installed and that their security software is properly updated and configured,” explains Fitzgerald.

“Users of security solutions other than ESET’s might wish to get a second opinion from the ESET Online Scanner.”

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”