Hackers resurrect notorious attack toolkit

Neosploit, thought dead three months ago, behind PDF attacks, researcher says

Neosploit, the notorious hacker exploit kit that some thought had been retired months ago, has not only returned from the dead, but is responsible for a dramatic increase in attacks, a security researcher claimed Thursday.

"Neosploit's back," said Ian Amit, director of security research at Aladdin Knowledge Systems.

The accounts of its demise last summer had been a ruse, he argued. "When you're feeling that kind of heat," Amit said, referring to the attention Neosploit had received from both researchers and authorities, "you want to shake those guys off your back. [The talk about quitting] only helped them go under the radar."

In July researchers at RSA's FraudAction Research Labs said that they had evidence that the creators of Neosploit were abandoning the business. For proof, RSA quoted a going-out-of-business message said to have originated with Neosploit's authors.

Neosploit, which first appeared in 2007, was a follow-on to the earlier MPack, and a contemporary to another infamous exploit kit, WebAttacker. Those kits, Neosploit included, were used by cybercriminals to launch attack code aimed at new vulnerabilities in Windows, Internet Explorer or third-party software such as Apple's QuickTime. But Neosploit also boasted features new to the click-to-attack business, including sophisticated statistical analysis and management tools.

However, even RSA didn't expect the Neosploit group to disband. "This isn't necessarily the end of this group," said Sean Brady, an RSA product marketing manager, in July.

Turns out he was right.

A month ago, researchers at Aladdin started to suspect that the Neosploit developers were back in business. Two days ago, they uncovered hard evidence: A server hosted in Argentina, run by a longtime Neosploit customer, that contained Neosploit 3.1. The build was dated Aug. 9, weeks after Neosploit's makers supposedly threw in the towel.

According to Amit, other data on the server showed that it was catering to 20 users, seven of whom he characterized as "very high volume," who were logging thousands of successful exploits each day from their use of Neosploit.

Those 20 criminals, added Amit, had compromised between 200 and 300 Web sites, which in turn were being used to serve up exploits from Neosploit to any visitor running a system that had not been fully patched. He found evidence of more than a quarter-million successful attacks against PCs carried out by those sites.

"Neosploit's sole purpose is to deliver malicious code to browsers," Amit said, noting that site hacking isn't part of the kit's jobs. Instead, criminals compromise sites through other vulnerabilities or by gaming the site's administrative password. Only then do they modify the hacked site with attack code from Neosploit.

Tags hack

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)

Comments

Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?