Menu
The Neutrino exploit kit has a new way to detect security researchers

The Neutrino exploit kit has a new way to detect security researchers

Neutrino is using passive OS fingerprinting to detect visiting Linux machines, according to Trustwave

The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks.

The feature was discovered after Trustwave's SpiderLabs division found computers they were using for research couldn't make a connection with servers that delivered Neutrino.

"The environment seems completely fine except for when accessing Neutrino," wrote Daniel Chechik, senior security researcher.

Exploit kits are one of the most effective ways that cybercriminals can infect computers with malware. They find vulnerable websites and plant code that transparently connects with another server that tries to exploit software vulnerabilities.

If the server finds a hole, the malware is delivered, and the victim is none the wiser. Exploit kits are also sometimes delivered by malicious online ads in attacks known as malvertising.

Malware writers and cyberattackers have long used methods to try to stop security engineers from studying their methods. For example, some malware programs are designed to quit if they're running in a virtual machine.

Chechik wrote that Trustwave tried changing IP addresses and Web browsers to avoid whatever was causing the Neutrino server to not respond, but it didn't work.

But by fiddling with some data traffic that Trustwave's computers were sending to the Neutrino server, they figured out what was going on.

Neutrino has been engineered to use passive OS fingerprinting, which is a method to collect and analyze data packets without the entity that is sending the packets knowing their computers are being profiled. In this case, the computer sending the packets is a security researcher's system that's probing the hackers' server.

Passive OS fingerprinting captures "traffic coming from a connecting host going to the local network," according to a post on the SANS blog. "The fingerprinting can then be conducted without the remote host being aware that its packets are being captured."

Michal Zalewski, a security researcher who works for Google, wrote a tool specifically for passive OS fingerprinting.

It offers attackers the advantage of stealth, since active OS fingerprinting -- which involves sending direct traffic to another network -- can trigger alerts from firewalls and intrusion detection equipment.

Chechik wrote that Neutrino appears to be using passive OS fingerprinting in order to shut down connections coming from Linux machines, which are likely to be used by security researchers.

"This approach generally reduces their exposure to anything from automated scans to unwanted security researchers," he wrote.

It's a smart move by Neutrino's developers, because if a server doesn't respond, it's generally considered down.

"It is very likely that this behavior would simply be written off as a dead server and Neutrino would achieve its goal of being left alone by anyone who isn't a potential victim," Chechik wrote.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments