Menu
Drive-by attack relies on hacked GoDaddy accounts

Drive-by attack relies on hacked GoDaddy accounts

The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure

Hundreds of hacked domain name accounts registered through GoDaddy are being used as part of a highly effective campaign using the Angler exploit kit to infect computers with malware.

The attackers are using the accounts to create subdomains that shuttle Web surfers to websites hosting Angler, wrote Nick Biasini, an outreach engineer with Cisco Systems.

The owners of the accounts are usually unaware of the activity, which Cisco calls "domain shadowing," since they may rarely log into their accounts. Hundreds of GoDaddy accounts that have several thousand domain names assigned to them have been compromised, Biasini wrote.

At least 10,000 unique subdomains that have been created on those accounts have been used for Angler-related attacks. GoDaddy officials couldn't immediately be reached for comment.

Nearly a third of the domain names on the Internet are registered through GoDaddy, which may be why so many of the compromised accounts are with that registrar, Biasini wrote. The domain name accounts are likely compromised by stealing the login credentials through phishing attacks.

An Angler attack starts when someone views a malicious advertisement. That advertisement then redirects the person to one of the hacked subdomains, which either delivers the exploit kit or redirects to another website hosting the kit.

Cybercriminals have moved to domain shadowing to keep their malware campaigns alive for longer, Biasini wrote. In the past, cybercriminals have registered new domain names that were used for attacks, but those were often quickly blocked.

Domain shadowing is harder to stop. Biasini wrote that the hacked domain name accounts are largely random, so it's hard to predict which ones might be used next in attacks. Blocking is difficult since the cybercriminals can frequently switch to newly generated subdomains, he wrote.

"Some of the subdomains are only active for a matter of minutes and only are reached a couple of times," Biasini wrote.

That has also made it harder for researchers to get a sample of Angler to see what software vulnerabilities it is exploiting.

Angler has proved to be a very effective exploit kit, as its developers quickly incorporate the latest zero-day vulnerabilities in Adobe Systems' software such as Flash and Microsoft's Silverlight multimedia program.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Cisco SystemssecurityGoDaddymalware

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments