
- BLACKHOLE EXPLOIT KIT PDF
- BLACKHOLE EXPLOIT KIT UPDATE
- BLACKHOLE EXPLOIT KIT SOFTWARE
- BLACKHOLE EXPLOIT KIT CODE
- BLACKHOLE EXPLOIT KIT DOWNLOAD
BLACKHOLE EXPLOIT KIT DOWNLOAD
On every successful exploitation the running shellcode downloads and executes a malicious binary (a download / execute type of shellcode). Silently registers the downloaded binary as calling regsrv32.exe –s Īs noted above, the anti-virus payload detection is low, with 13 of 43 vendors catching it, a 30.2% success rate.Once the vulnerability is successfully exploited the payload tries to download and save on the infected system another malicious binary (analysis later).
BLACKHOLE EXPLOIT KIT UPDATE
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. Zoom.class attempts to exploit “ CVE 2010-0840”: I used JD decompiler to decompile the class files.
BLACKHOLE EXPLOIT KIT CODE
The exploit kit sends a heavily obfuscated JS code with a Java applet code that downloads a malicious JAR file to the infected system.Īfter uncompressing the jar file, 5 java class files are extracted: Here, the kit checks for a HCP exploitation (CVE-2010-1885): Here, the kit checks for a flash exploitation (CVE-2011-0611): Here, the kit checks for the installed OS:

We can see that the code is going to extract the versions of the following installed applications: By deobfuscating the above JS we can notice the following java scripts and functions that reveal the targets. The BEP searches for several vulnerabilities to propagate itself. Then, the exploit kit will check for vulnerable applications and will select the best exploit. We can see that the redirection is achieved by the JS document.location property: Each JS.JS contains a redirection to a black hole exploit kit server.

We can immediately see the 4 JS.JS java scripts sources. Once clicked, we get the infamous “WAIT PLEASE LOADING……” page. The most common method used by BlackHole to spread is via links inside phishing emails. Here’s a breakdown of the infection flow:Ī live exploit pack only requires a victim “drive-by” – a trivial site visit – to start the infection process. NOTE: For any pictures, click on them to BIGGIFY. A domain name comes included with the rental agreement, but should you desire to change it you need to pay another $35. You can rent the kit (on the author’s servers) for $50 for 24 hours, $200 for 1 week, $300 for 2 weeks, $400 for 3 week, and $500 for 4 weeks. For those malicious users with a commitment phobia the makers of the kit offer yet another solution.
BLACKHOLE EXPLOIT KIT SOFTWARE
The license includes free software updates for the duration of the contract. Users can purchase the annual license for $1500, semi-annual license for $1000, or just a quarterly license for $700. One blog published (with updates) a great overview of the most known exploit packs.Īccording the Hacker News, the black market cost of the pack:
BLACKHOLE EXPLOIT KIT PDF
Blackhole is a very powerful kit with a number of recent exploits including Java and Adobe PDF exploits. Toolkits are usually heavily obfuscated using some known or unknown obfuscation and crypto algorithms tools to avoid detection by anti-virus vendors.īlack hole is yet another web exploit kit developed by Russian hackers.


The toolkit is a bundle of PHP and HTML files with a list of exploit files (including JAVA, PDF, Browsers, Adobe Flash Player …etc) designed to target the operating system, browser or other client side application. In this case, there were four that could be redirected if any of the URLs was taken down.Īn exploit kit, a browser exploit pack (BEP) is a toolkit that automates the exploitation of client side vulnerabilities. In the past, we’ve seen hackers deploy a single exploit server. This serves as a not-so-gentle reminder the fundamental problem with signature based AV-it changes every week with the use of a new encryption algorithm. As usual, the encryption signature is new, avoiding AV-our analysis showed that 70 percent of AV software would miss this altogether. Malware developers continue to use the latest tools to encrypt their malware to evade anti-virus (AV) software.Before we get super geeky, some general observations about the innovation in this kit: The new black hole exploit kit has been out and we’ve had a chance to deconstruct it. In addition to Tomer, Sarit has now joined the team to add a feminine touch to the dissection process. What is the biggest black hole in cyber space? Imperva’s malware dissection team took a careful look at the Black Hole Exploit kit anatomy. This month, the science journal Nature published a story on the biggest black hole ever discovered by UC Berkeley researchers.
