Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Blackhole Exploit Kit Infects 2,900 Cryptome Visitors

    Written by

    Fahmida Y. Rashid
    Published February 13, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Cryptome.org, a Website known for publishing intelligence documents and leaked files, appears to have been compromised and infected with the Blackhole exploit kit, according to documents posted on the site.

      Unknown attackers breached Cryptome.org on Feb. 8 and installed the Blackhole exploit kit, Cryptome reported on Feb. 12. The infection was identified by a reader on Feb. 12. It’s not clear who may have been behind the attack, but Symantec appears to be investigating the incident.

      Nearly all of Cryptome’s 6,000 pages in the main directory were altered to include the malicious PHP script that redirected site visitors to a third-party Website, Cryptome said. Another 5,000 files in other subdirectories were also modified. It appears that the intruders managed to change the files without modifying the time stamp on the directory.

      “Sneaky,” Cryptome said on its post.

      Approximately 2,900 visitors are believed to have been redirected and compromised, according to an analysis of the logs. However, the logs did not show how access was gained through the Internet service provider.

      A Cryptome reader analyzed the malicious script and found that the attack script specifically avoided targeting IP addresses from Google to prevent the search engine from blacklisting the site.

      Cryptome is a repository for tens of thousands of sensitive documents leaked from government agencies and the private sector, and this incident is not the first time Cryptome has been breached. The site was hit by a breach in 2010, shortly after posting documents critical of rival leak site WikiLeaks and its founder Julian Assange.

      The Blackhole exploit kit is one of the most popular toolkits being used, according to a recent Security Labs report from M86 Security. Researchers analyzed malicious URLs identified by the security firm between July and December 2011 and found that Blackhole was the source of about 95 percent of all the malicious links.

      More than half the most common exploits in the last half of 2011 could be launched using Blackhole, including those targeting vulnerabilities in Adobe, Java and Microsoft products. Cyber-criminals are also constantly innovating to keep the toolkit up-to-date and effective with the latest exploits, according to M86.

      Phoenix was considered to be the more popular toolkit, but it no longer appears to be the case. M86 researchers discovered it infected only 1.3 percent of the links analyzed in the second half of 2011. Blackhole’s surging popularity might have to do with the fact that in 2011, the people behind the kit made the source code freely available for anyone to download and modify. A commercial version of the kit sells for about $1,500 in the criminal underground.

      Weak FTP credentials are generally the primary point of entry for attackers trying to inject code into Websites, Stefan Tanase, a senior security researcher at Kaspersky Lab, said in a talk at the Kaspersky Lab Security Analyst Summit. If a Website has been compromised, the first step is to change the FTP passwords. Web administrators should also thoroughly check the source code of their files as well as all associated scripts to ensure that malicious code was not added, said Tanase.

      Avast researchers in November reported that thousands of blogs hosted on WordPress.com had been compromised and infected with the Blackhole kit. Attackers used stolen or guessed FTP credentials to upload a malicious PHP file on to the server hosting the blogs, which then injected the malicious code into the files, according to Avast. The attackers also exploited a known vulnerability in the TimThumb image resizing utility used by many of the blogs.

      Many of the Websites hosting Blackhole often are used to spread the Carberp Trojan on victims’ machines. Visitors redirected to the malicious Website are hit by drive-by-downloads to install Carberp, often by exploiting Java vulnerabilities, according to an analysis by ESET.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×