Spam campaign doubles on threats
Posted on 14.11.2013
Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam campaign recently spotted by Trend Micro.

The spam email in question is a fake “You received a voice mail” notice that offers both a malicious link and a malicious attachment.

The former leads to a compromised site with malicious JavaScript set on redirect visitors to sites hosting Blackhole, but in this particular instance, the researchers couldn’t confirm the redirection chain. Nevertheless, they say that “the added content to the compromised sites…is almost identical to that used by Blackhole campaigns.”

The latter holds a variant of the Upatre Trojan, which downloads and installs a Zeus Trojan variant. As recently noted, the Upatre downloader is a favorite tool of the Cutwail botmasters, who were previously using Blackhole almost exclusively.

“Long term, it’s unclear what this indicates. It may mean that attackers are turning to another exploit kit to replace BHEK as a long-term solution, but we cannot say for sure,” the researchers concluded.

On the other hand, this malicious spam campaign might also indicate that at least some peddlers are not very prompt when it comes to reacting to changed circumstances, or do not care that much and simply choose to rely on users downloading the attached malware.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th