Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Development
    • Mobile
    • PC Hardware

    HP Security Expert: Exploit Kits More Sophisticated, Harder to Detect

    Written by

    Jeff Burt
    Published July 25, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Web exploit kits are getting more complex and harder to detect, and the cyber-criminals developing such toolkits as Blackhole and Phoenix are themselves becoming more sophisticated as they leverage a more traditional software business model, according to a security expert from Hewlett-Packard.

      In addition, these attackers are increasingly targeting Java in their efforts, finding that many enterprises and consumers are failing to apply fixes in a timely fashion, making themselves more vulnerable, according to Jason Jones, the team lead for advanced security intelligence for HP€™s DVLabs.

      €œAll these guys are [constantly improving] their stuff and they take what they do seriously,€ Jones told eWEEK in a recent interview.

      Jones is scheduled to give a presentation July 26 at the Black Hat 2012 show in Las Vegas, outlining his research into some of the more common Web exploit toolkits on the market, including Blackhole and Phoenix.

      Exploit toolkits are becoming an increasingly popular way for cyber-criminals to attack vulnerabilities in systems, he said. They have proven to be easy to use and easy to adapt, and people can make a lot of money not only using these kits, but also developing and leasing them to others, sometimes for thousands of dollars a month.

      At the same time, toolkit developers are creating more of a traditional software model around the malware€”sending out updates, making fixes, offering basic quality-assurance guarantees, making the toolkits easier to install€”and changing the coding just enough to make it difficult to detect and combat the toolkits.

      And by making the exploit toolkits easier to install and use, developers are now finding a larger number of people to sell to, Jones said.

      €œYou€™ve just actually increased your user base,€ he said, adding that when others €œsee something that€™s very successful, they€™re going to run with it.€

      For several years, the Phoenix toolkit was among the most popular, though it has been eclipsed over the past year by the Blackhole platform. A report by researchers at M86 Security in February found that of the malicious URLs identified between July and December 2011, Blackhole was the source of about 95 percent of them. More than half of the most common exploits during those months could be launched using Blackhole, including those targeting vulnerabilities in Adobe, Java and Microsoft products.

      By contrast, M86 found that Phoenix infected only 1.3 percent of the links analyzed. The researchers suggested that Blackhole’s growing popularity could come from the fact that last year, the people behind the kit made the source code available for free for anyone to download and modify. A commercial version of the kit sells for about $1,500 in the criminal underground, they said.

      Blackhole developers also are good at what Jones calls €œobfuscation techniques,€ where they will change the coding just enough to make it difficult to detect and identify.

      Other exploit toolkits also are being developed to be difficult to detect. One coming out of Russia, dubbed €œSweet Orange,€ has been hard to nail down because the people behind it are being particularly careful in how they give out information and sell the kit. There aren€™t any samples available on the Internet, Jones said.

      Increasingly, attackers are targeting Java vulnerabilities to exploit, he said. The success rate in attacking Java is high, in large part due to the fact that users are slow to deploy available security updates in a timely fashion. A typical success rate for a Java exploit is 12 to 14 percent, he said, adding that a Java exploit incorporated into Backhole last year had a success of more than 80 percent. Because of this, the amount of malware targeting Java has increased, and that trend will continue as long as people are lax in updating the security.

      Jones also urged Oracle€”which took over Java after buying Sun Microsystems in 2010€”to be more forceful in its messages to users about updating Java.

      The development of exploit toolkits also is beginning to expand geographically, he said. Most toolkits are created by people in Russia and Eastern Europe. However, a small but growing number of toolkits are coming out of China, though they are less sophisticated and might not have all the features as other malware, such as complex user interfaces, Web administration tools or control panels. However, it€™s an indication that the money that can be made via Web exploit toolkits is fueling interest worldwide.

      €œThey€™ll continue to [migrate] to other regions,€ Jones said. €œIt€™s becoming too much of a profitable market [attracting] people who might want to do this.€

      Until that changes, there will continue to be a booming market for successful exploit toolkits like Blackhole and Phoenix.

      €œThese guys really aren€™t doing anything really sophisticated,€ Jones said. €œThey€™re doing enough to keep themselves making money and avoiding detection.€

      Jeff Burt
      Jeff Burt
      Jeffrey Burt has been with eWEEK since 2000, covering an array of areas that includes servers, networking, PCs, processors, converged infrastructure, unified communications and the Internet of things.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×