An exploit kit called Magnitude (formerly known as PopAds) continues to gain popularity among cyber criminals, thanks to its high success probability and an innovative distribution model that doesn’t require ‘customers’ to make a downpayment.
Instead, the team behind Magnitude takes control of up to a fifth of compromised machines, and infects them with ransomware.
US security vendor Trustwave has been tracking the spread of the exploit kit and uncovered eight control servers, three of which are based in the UK, that have been used to infect as many as 210,000 computers per month.
These findings were presented at the annual Black Hat cyber security conference in Las Vegas.
It is widely believed that Magnitude is filling the void left after ‘Paunch’, one of the alleged creators of the popular Blackhole exploit kit, was arrested in Russia in October 2013. Following the arrest, the service for updating Blackhole was shut down and its malware encryption service became inaccessible.
“We saw cases where people managed to infect a large number of machines and the portion they had to allocate was smaller, down to five percent. It’s like a volume discount,” Ziv Mador, Director of Security Research at Trustwave, told TechWeekEurope.
Much like the infamous ‘Cryptolocker’, Cryptowall Defense encrypts victim’s files and then demands a ransom in Bitcoin. Trustwave tracked the digital wallets that belong to the creators of Magnitude, and came to the conclusion that the scheme netted them at least $60,000 to $100,000 a week.
“The cybercrime world has become very modular, in a similar way to the world of legitimate business,” Mador explained. “The cyber gang behind Magnitude, what they do best is run those servers, develop those exploits and set up all the infrastructure needed to run a campaign and infect a large number of machines out there, that’s their expertise. The customers, who are obviously also cyber criminals – nothing here is legit – all they have to do is generate traffic to the exploit kit, and provide their malware of choice.”
Magnitude attempted to exploit 1.1 million unique IPs and successfully infected 210,000 computers during a single month of observation. The operation is controlled from three servers in the UK, four in the Netherlands and one in Ukraine. The countries with most victims are the US and Iran, however 6,347 victims were from the UK.
The kit is based around three simple exploits that target older versions of Internet Explorer and Java. Despite its basic structure, Magnitude is surprisingly effective, especially in developing countries – for example, the infection success rate in Vietnam stood at 68 percent.
“The infection rates depend on the level of patching, age of software – old browsers are more susceptible to infection. But it also depends on deployment of security products,” said Mador. He added that organisations in developing countries spend less on security products, which leaves them more vulnerable to cyber crime.
How well do you know network security? Try our quiz and find out!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…