Menu
Drive-by attack relies on hacked GoDaddy accounts

Drive-by attack relies on hacked GoDaddy accounts

The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure

Hundreds of hacked domain name accounts registered through GoDaddy are being used as part of a highly effective campaign using the Angler exploit kit to infect computers with malware.

The attackers are using the accounts to create subdomains that shuttle Web surfers to websites hosting Angler, wrote Nick Biasini, an outreach engineer with Cisco Systems.

The owners of the accounts are usually unaware of the activity, which Cisco calls "domain shadowing," since they may rarely log into their accounts. Hundreds of GoDaddy accounts that have several thousand domain names assigned to them have been compromised, Biasini wrote.

At least 10,000 unique subdomains that have been created on those accounts have been used for Angler-related attacks. GoDaddy officials couldn't immediately be reached for comment.

Nearly a third of the domain names on the Internet are registered through GoDaddy, which may be why so many of the compromised accounts are with that registrar, Biasini wrote. The domain name accounts are likely compromised by stealing the login credentials through phishing attacks.

An Angler attack starts when someone views a malicious advertisement. That advertisement then redirects the person to one of the hacked subdomains, which either delivers the exploit kit or redirects to another website hosting the kit.

Cybercriminals have moved to domain shadowing to keep their malware campaigns alive for longer, Biasini wrote. In the past, cybercriminals have registered new domain names that were used for attacks, but those were often quickly blocked.

Domain shadowing is harder to stop. Biasini wrote that the hacked domain name accounts are largely random, so it's hard to predict which ones might be used next in attacks. Blocking is difficult since the cybercriminals can frequently switch to newly generated subdomains, he wrote.

"Some of the subdomains are only active for a matter of minutes and only are reached a couple of times," Biasini wrote.

That has also made it harder for researchers to get a sample of Angler to see what software vulnerabilities it is exploiting.

Angler has proved to be a very effective exploit kit, as its developers quickly incorporate the latest zero-day vulnerabilities in Adobe Systems' software such as Flash and Microsoft's Silverlight multimedia program.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Cisco SystemssecurityGoDaddymalware

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments