Menu
Top websites affected by Angler exploit kit malvertising, security vendors say

Top websites affected by Angler exploit kit malvertising, security vendors say

The attacks delivered a backdoor called BEDEP and sometimes the TeslaCrypt ransomware

Tens of thousands of Web browsers may have been exposed to ransomware and other malware over the last few days after malicious advertisements appeared on high-profile websites, security vendors said Monday.

The malicious advertisements are connected to servers hosting the Angler exploit kit, a software package that probes a computer for software vulnerabilities in order to deliver malware, Trend Micro said.

Security vendor Trustwave wrote on Monday that it also detected a large Angler-related malvertising campaign.

It wasn't immediately clear if both vendors were writing about the same campaign. Both did note in their blog posts that the campaign delivered a backdoor called BEDEP, which allows an attacker to place other malware on a computer.

Trustwave said in some cases it saw the attack deliver BEDEP and TeslaCrypt, a type of file-encrypting malware.

The attackers Trustwave studied appeared to have gained control of a domain called "brentsmedia[dot]com" that at one time may have been used for online advertising.

"BrentsMedia was probably a legitimate business, and though we can't know Angler's side of this story for sure, it's likely that the people behind Angler are trying to ride on the reputation the domain had and abuse it to trick ad companies into publishing their malicious ads," Trustwave wrote.

Several high-profile websites pulled a JSON file from brentsmedia[dot]com as part of loading advertisements shown on their sites, Trustwave wrote. The JSON file had 12,000 lines of heavily obfuscated JavaScript, which was suspicious.

The JavaScript in part tries to figure out if certain security products or tools are running a computer. If none are, it loads a landing page from another domain hosting the Angler exploit kit, Trustwave wrote.

The malicious ads were hosted by two online advertising companies, one of which immediately killed the offending ad after being notified by Trustwave. The other company couldn't be reached.

The affected sites included answers.com and zerohedge.com, Trustwave said. Trend Micro didn't identify the publishers it saw were affected.

There's little publishers can do to stop malvertising since online advertising companies should be vetting and filtering malicious ones. Although detecting malicious ads is getting better, it's far from perfect.

Placing a malicious ad on a highly trafficked website means an attacker could potentially infect many computers in a very short period of time, offering a great advantage over simple spam.

The Angler campaign observed by Trend may have "affected tens of thousands of users in the last 24 hours alone," wrote Joseph C. Chen, a Trend Micro fraud researcher.

"Based on our monitoring, the malicious ads were delivered by a compromised ad network in various highly-visited mainstream websites–including news, entertainment and political commentary sites," Chen wrote.

"As of this writing, while the more popular portals appear to be no longer carrying the bad ad, the malvertising campaign is still ongoing and thus continues to put users at risk of downloading malware into their systems," he wrote.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags softwareTeslaCryptAngler exploit kitsoftware packageBEDEP

Events

Why experience is the new battleground for partners

Join us for an exclusive webinar, in association with Hewlett Packard Enterprise and Technology Services Industry Association (TSIA) and learn about the latest industry insights and how technology services continue to evolve to deliver differentiated value, and how partners can be successful in 2021 and beyond.

Featured

Slideshows

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

More than 500 channel leaders gathered in Auckland on 21 October at the ​Reseller News Innovation Awards ​2020 to celebrate the achievements of the New Zealand technology industry's top partners, start-ups, vendors, distributors and individuals.

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners
Show Comments