Jump to content

The Neutrino exploit kit has a new way to detect security researchers


steven36

Recommended Posts

The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks

.xTUkRGE.png

 

The feature was discovered after Trustwave's SpiderLabs division found computers they were using for research couldn't make a connection with servers that delivered Neutrino.

 

"The environment seems completely fine except for when accessing Neutrino," wrote Daniel Chechik, senior security researcher.

 

If the server finds a hole, the malware is delivered, and the victim is none the wiser. Exploit kits are also sometimes delivered by malicious online ads in attacks known as malvertising.

 

Malware writers and cyberattackers have long used methods to try to stop security engineers from studying their methods. For example, some malware programs are designed to quit if they're running in a virtual machine.

 

Chechik wrote that Trustwave tried changing IP addresses and Web browsers to avoid whatever was causing the Neutrino server to not respond, but it didn't work.

 

But by fiddling with some data traffic that Trustwave's computers were sending to the Neutrino server, they figured out what was going on.

 

Neutrino has been engineered to use passive OS fingerprinting, which is a method to collect and analyze data packets without the entity that is sending the packets knowing their computers are being profiled. In this case, the computer sending the packets is a security researcher's system that's probing the hackers' server.

 

Passive OS fingerprinting captures "traffic coming from a connecting host going to the local network," according to a post on the SANS blog. "The fingerprinting can then be conducted without the remote host being aware that its packets are being captured."

 

Michal Zalewski, a security researcher who works for Google, wrote a tool specifically for passive OS fingerprinting.

 

It offers attackers the advantage of stealth, since active OS fingerprinting -- which involves sending direct traffic to another network -- can trigger alerts from firewalls and intrusion detection equipment.

 

Chechik wrote that Neutrino appears to be using passive OS fingerprinting in order to shut down connections coming from Linux machines, which are likely to be used by security researchers.

 

"This approach generally reduces their exposure to anything from automated scans to unwanted security researchers," he wrote.

 

It's a smart move by Neutrino's developers, because if a server doesn't respond, it's generally considered down.

 

"It is very likely that this behavior would simply be written off as a dead server and Neutrino would achieve its goal of being left alone by anyone who isn't a potential victim," Chechik wrote.

 

The Source

 

Link to comment
Share on other sites


  • Views 424
  • Created
  • Last Reply

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...