{"id":10829,"date":"2011-12-01T21:15:30","date_gmt":"2011-12-02T02:15:30","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=10829"},"modified":"2021-08-08T19:52:55","modified_gmt":"2021-08-08T23:52:55","slug":"blackhole-malware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/blackhole-malware\/","title":{"rendered":"Blackhole Malware"},"content":{"rendered":"<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11564\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Blackhole Malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/malware2.jpg?resize=90%2C90&#038;ssl=1\" alt=\"Blackhole Malware\" width=\"90\" height=\"90\" \/> <\/em><a title=\"www.darkreading.com\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Dark Reading<\/em><\/a> <a title=\"www.darkreading.com\" href=\"https:\/\/web.archive.org\/web\/20120503002031\/http:\/\/www.darkreading.com:80\/advanced-threats\/167901091\/security\/attacks-breaches\/231900780\/blackhole-crimeware-goes-prime-time.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that attackers are increasingly using the <a title=\"research.zscaler.com\" href=\"http:\/\/research.zscaler.com\/2011\/02\/blackhole-exploits-kit-attack-growing.html\" target=\"_blank\" rel=\"noopener noreferrer\">Blackhole exploit kit<\/a> in <a title=\"www.microsoft.com\" href=\"https:\/\/web.archive.org\/web\/20160219214154\/http:\/\/www.microsoft.com\/security\/online-privacy\/phishing-symptoms.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">phishing campaigns<\/a>. The latest phishing scam poses as an email notification from an\u00a0<a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HP<\/a> (<a title=\"NYSE : HPQ\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:HPQ\" target=\"_blank\" rel=\"noopener noreferrer\">HPQ<\/a>) <a title=\"www.hp.com\" href=\"https:\/\/web.archive.org\/web\/20141002053638\/http:\/\/www.hp.com:80\/products1\/inkjetprinter\/officejet.html\" target=\"_blank\" rel=\"noopener noreferrer\">OfficeJet Printer<\/a> that has sent around 36,000 per minute resulting in nearly 8 million emails thus far and uses 2,000 domains to serve up the <a class=\"zem_slink\" title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">malware<\/a>.<\/p>\n<p><a title=\"Botnet\" href=\"http:\/\/arstechnica.com\/tech-policy\/news\/2011\/11\/how-the-most-massive-botnet-scam-ever-made-millions-for-estonian-hackers.ars\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11566\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"botnet\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2011\/10\/botnet1-150x112.jpg?resize=81%2C60\" alt=\"Botnet\" width=\"81\" height=\"60\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/botnet1.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/botnet1.jpg?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/botnet1.jpg?w=333&amp;ssl=1 333w\" sizes=\"auto, (max-width: 81px) 100vw, 81px\" \/><\/a>Researchers at <a title=\"www,appriver.com\" href=\"http:\/\/www.appriver.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">AppRiver<\/a> told <em>Dark Reading<\/em> the trend demonstrates how Blackhole is following the pattern of popular <a class=\"zem_slink\" title=\"Crimeware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Crimeware\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">malware<\/a> kits <a title=\"searchsecurity.techtarget.com\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Zeus-Trojan-Zbot\" target=\"_blank\" rel=\"noopener noreferrer\">Zeus<\/a> and <a title=\"www.microsoft.com\" href=\"http:\/\/www.microsoft.com\/security\/portal\/threat\/Encyclopedia\/Entry.aspx?Name=Trojan%3AWin32%2FSpyeye\" target=\"_blank\" rel=\"noopener noreferrer\">SpyEye<\/a>. Blackhole traditionally has been used to infect legitimate websites for <a title=\"www.ebankingabersicher.ch\" href=\"https:\/\/www.ebankingabersicher.ch\/index.php?option=com_content&amp;view=article&amp;id=75&amp;Itemid=0&amp;lang=en\" target=\"_blank\" rel=\"noopener noreferrer\">drive-by infection<\/a> purposes. &#8220;<em>This attack is unique because Blackhole added an email vector to its format and is flooding the Internet with similar methods used by Zeus, SpyEye, and others, essentially moving it into prime time,<\/em>&#8221; says Fred Touchette, senior security analyst for AppRiver.<\/p>\n<p>Blackhole, which was previously marketed as a high-end crimeware tool, costing $1,500 for a one-year license, in May was <a title=\"www.schneier.com\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2011\/05\/blackhole_explo.html\" target=\"_blank\" rel=\"noopener noreferrer\">unleashed for free<\/a> in some underground forums. That has propelled more use of the toolkit according to the AppRiver <a title=\"blogs.appriver.com\" href=\"https:\/\/web.archive.org\/web\/20120831012746\/http:\/\/blogs.appriver.com:80\/blog\/digital-degenerate\/blackhole-toolkit-rivals-zeus\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20211021194428\/https:\/\/appriver.com\/partners\" target=\"_blank\" rel=\"appriver logo noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Appriver logo\" src=\"https:\/\/i0.wp.com\/www.appriver.com\/files\/images\/misc\/AppRiver-Logo.png?resize=89%2C38&#038;ssl=1\" alt=\"Appriver logo\" width=\"89\" height=\"38\" \/><\/a>Mr. Touchette said that attackers using Blackhole have changed tactics, &#8220;<em>This is the first that I have personally noticed that leads email recipients to Blackhole websites. Before that, people using the Blackhole Kit relied on techniques such as <a title=\"www.windowsecurity.com\" href=\"https:\/\/web.archive.org\/web\/20130117021632\/http:\/\/windowsecurity.com\/articles\/SEO-Poisoning-What-it-is-what-you-can-do-about-it.html\" target=\"_blank\" rel=\"noopener noreferrer\">SEO poisoning<\/a> to lead victims to their sites,<\/em>&#8221; he says.<\/p>\n<p>The OfficeJet email campaign, like other Blackhole attacks, is trolling for victims&#8217; <a class=\"zem_slink\" title=\"Online banking\" href=\"http:\/\/en.wikipedia.org\/wiki\/Online_banking\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">online banking<\/a> credentials according to <em>Dark Reading<\/em>. It works a lot like Zeus and others, using browser vulnerabilities on victims&#8217; machines and creating a backdoor for downloading and installing the Trojans. AppRiver&#8217;s Touchette says Blackhole appears to favor <del>Sun<\/del> <a title=\"Oracle\" href=\"https:\/\/www.oracle.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle<\/a> (<a title=\"NASDAQ : ORCL\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-ORCL\/\" target=\"_blank\" rel=\"noopener noreferrer\">ORCL<\/a>) Java <em>(I wrote about Java holes <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-FW\" target=\"_blank\" rel=\"noopener\">here<\/a><\/em>) and <a title=\"Adobe\" href=\"https:\/\/www.adobe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe<\/a> (<a title=\"NASDAQ : ADBE\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-ADBE\/\" target=\"_blank\" rel=\"noopener noreferrer\">ADBE<\/a>) bugs (<em>I wrote about Adobe bugs <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-L5\" target=\"_blank\" rel=\"noopener\">here<\/a><\/em>).<\/p>\n<p><a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-11572 size-full alignright\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"HP_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/10\/HP_logo1.gif?resize=50%2C48&#038;ssl=1\" alt=\"HP\" width=\"50\" height=\"48\" \/><\/a>&#8220;<em>This most recent campaign is still trickling in, but will soon stall as most of its domains have been picked up and blacklisted by security professionals &#8230; we were seeing malicious emails related to this campaign coming in at a rate of around 36,000 per minute,<\/em>&#8221; Mr. Touchette says.<\/p>\n<p>Recent <a class=\"zem_slink\" title=\"Botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Botnet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">botnet<\/a> takedowns have spurred an increase in malware attacks recently as botnet operators try to rebuild, AppRiver&#8217;s Touchette told <em>Dark Reading.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Yeap- We are still seeing these trickling in and still have users reporting they can&#8217;t access their OfficeJet.<br \/>\n<\/em><\/p>\n<h6 class=\"zemanta-related-title\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul\">\n<li class=\"zemanta-article-ul-li\">Positive Trend in Malware: Rootkit Developers Killing Each Other&#8217;s Code (pcworld.com)<\/li>\n<\/ul>\n<div class=\"zemanta-pixie\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attackers are using the Blackhole malware exploit kit in phishing scam poses as an email notification from an HP Printer to steal user data<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,864,863,866,168,904,23,836,612,865,4,867,127],"class_list":["post-10829","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-appriver","tag-blackhole","tag-crimeware","tag-hp","tag-hpq","tag-malware","tag-oracle","tag-phishing","tag-search-engine-optimization","tag-security","tag-spyeye","tag-zeus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10829"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10829\/revisions"}],"predecessor-version":[{"id":132937,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10829\/revisions\/132937"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}