<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

News & Reports

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

An exploit kit is a malicious toolkit that automates the exploitation of client-side vulnerabilities, usually targeting browsers and programs that a website can invoke through the browser. Common exploit targets have included vulnerabilities in Adobe Acrobat Reader, Java Runtime Environment and Adobe Flash Player. Security professionals might not agree on the exact definition of an exploit kit, as evidenced by Blaze’s Botnet Wars Q&A, but they agree on the general characteristics of this type of malware. Here’s my perspective on the nature of such attack tools.

Characteristics of Exploit Kits

A key characteristic of an exploit kit is the ease with which it can be used even by attackers who are not IT or security experts. The attacker doesn’t need to know how to create exploits to attack systems by purchasing or otherwise obtaining an exploit kit from a third party. Furthermore, an exploit pack typically provides a user-friendly web interface that helps the attacker track the infection campaign.

The functionality of an exploit kit tends to focus on compromising systems to run malicious payload of the attacker’s choice on the victim’s computer. For example, malware that an exploit kit delivers might have the ability to remotely control exploited systems, creating a botnet for further malicious activities. For an overview of the key characteristics of some exploit kits, see Mila’s Overview of Exploit Packs, which includes a spreadsheet of historical exploit kit features.

To increase the duration for which the exploits and the websites hosting exploit kits remain unknown to security researchers, exploit kit developers often incorporate analysis evasion tactics into their creations. For instance, malicious JavaScript running inside a browser can probe certain aspects of its runtime environment, looking for artifacts associated with malware analysis tools. Such exploit kits will not attack if they get “spooked” by the presence of such tools, as discussed in Minerva Lab’s report on this topic.

Some of exploit kits are developed and marketed in a specific country and, therefore, will be used more widely by attackers who speak that language or who hang out in those forums. However, the “beauty” of exploit kits is that they can be developed in Country A, sold in Country B, and used in Country C to attack Country D by using systems hosted in Country E. As the result, is that it’s hard to attribute malicious activity to actors located in a particular country by simply looking at IP addresses observed during the immediate attack.

Competing for Customers

Exploit kits are often developed by financially-motivated criminal organizations. These groups compete for customers based on several attributes, such as the frequency with which exploits are updated and how easy it is to set up and conduct attack campaigns. Commercial exploit kit developers even provide customer service to their clients. In some cases, miscreants specialize on using exploit kits to infect systems, earning money for every compromise.

The ease of use and affordability of exploit packs makes it possible even for people with low technical skills to become a “hacker,” be it for profit, politics or other reasons. The user friendliness of the control interface of the exploit kit might be one market differentiator, helping it stand out from the competition.

It’s not uncommon for criminals of all shapes and sizes to battle one another for control. Though there are a lot of potential targets for competing attackers to infect, it’s natural for the attacker to wish to assert full control over the newly-compromised system. If the host is already infected, the new attacker will need to remove the presence of a competing entity. It’s a variation of a children’s game called King of the Hill, though obviously with more severe repercussions.

Resisting Exploit Kit Attacks

Though some exploit packs target zero-day vulnerabilities, a large number of exploits go after vulnerabilities for which patches exist. For some examples of the vulnerabilities exploited by exploit kits, take a look at the Malware Don’t Need Coffee blog.

End-users and organizations should look closely at how they keep up with security patches on the desktop. End-users at home should use auto-update mechanisms of the targeted applications as well as enable auto-update capabilities built into the OS, such as Windows Update and macOS App Store.

Enterprise environments should use automated tools to identify vulnerable systems, install relevant patches and validate that the patches are installed. It’s also important to lock down the environment so that when an individual system is affected, the attack is contained and discovered quickly. Countermeasures should also include exploit mitigation measures built into the OS and antivirus tools. Minerva’s Anti-Evasion Platform provides another layer at repelling exploit kits, focusing specifically on those threats that are designed to get past other security controls. To learn more about our ability to protect enterprises from exploit kits, take a look at our solution brief.

This post was originally published on Lenny Zeltser’s personal blog.



Interested in Minerva? Request a Demo Below

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.


see all