{"id":9274,"date":"2013-01-08T00:00:04","date_gmt":"2013-01-08T07:00:04","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=9274"},"modified":"2018-01-30T11:12:53","modified_gmt":"2018-01-30T18:12:53","slug":"black-hole-exploit-kit-authors-vertical-market-integration-fuels-growth-in-malicious-web-activity","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/01\/08\/black-hole-exploit-kit-authors-vertical-market-integration-fuels-growth-in-malicious-web-activity\/","title":{"rendered":"Black Hole Exploit Kit author&#8217;s &#8216;vertical market integration&#8217; fuels growth in malicious Web activity"},"content":{"rendered":"<p>Historical cybercrime performance activity of multiple gangs and individuals has shown us that, in order for them to secure multiple revenue streams, they have the tendency to multi-task on multiple fronts while operating and serving the needs of customers within different cybercrime-friendly market segments.<\/p>\n<p>A logical question emerges in the context of the fact that 99% of all the spamvertised campaigns we&#8217;re currently intercepting rely on the latest version of the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>\u00a0&#8211; is Paunch, the author of the kit, multi-tasking as well? What&#8217;s the overall impact of his &#8216;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Vertical_integration\"><strong>vertical market integration<\/strong><\/a>&#8216; practices across the Web beyond maintaining the largest market share of malicious activity in regard to Web malware exploitation kits?<\/p>\n<p>Let&#8217;s find out by discussing two of his well known revenue sources and sample a campaign that&#8217;s relying on the managed iFrame\/Javascript crypting\/obfuscating service that he&#8217;s also operating.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample advertisement for the iFrame\/Javascript crypting\/obfuscating service operated by Paunch, within the kit&#8217;s control panel:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-9288\" alt=\"Paunch_Black_Hole_Exploit_Kit_Advertising\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising.png\" width=\"614\" height=\"63\" \/><\/a><\/p>\n<p>This is the most popular advertisement that was featured within the kit since day one, in an attempt by its author to not only achieve a decent brand awareness for the service, but also actually convert his current Black Hole Exploit Kit customers into customers of the crypting\/obfuscating service as well. The results? Pretty decent conversion rates, based on a systematic tracking of the pseudo-random obfuscations generated by the service, and actually used in campaigns intercepted in the wild.<\/p>\n<p>At a later stage, things slightly changed, perhaps due to the fact that Paunch&#8217;s service has gained the necessary market share. The author of the kit started soliciting advertisements from fellow cybercriminals, like the following ad:<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-9290\" alt=\"Paunch_Black_Hole_Exploit_Kit_Advertising_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_02.png\" width=\"614\" height=\"77\" \/><\/a><\/p>\n<p>What&#8217;s so special about the iFrame\/Javascript crypting\/obfuscation service operated by Paunch? It supports multiple crypting\/obfuscating algorithms, as well as API keys, allowing &#8216;on-the-fly&#8217; obfuscation for his customers to take advantage of.<\/p>\n<p><strong>Sample entry page for Paunch&#8217;s crypting\/obfuscating service:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_05.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-9291\" alt=\"Paunch_Black_Hole_Exploit_Kit_Advertising_05\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_05.png\" width=\"512\" height=\"377\" \/><\/a><\/p>\n<p>Sample Black Hole Exploit Kit campaigns&#8217; pseudo-random obfuscation examples that used Paunch&#8217;s service:<\/p>\n<ul>\n<li><span style=\"line-height:13px;\"><strong><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/fdic_spam_email_malware_exploits_black_hole_exploit_kit_02.png\">Cybercriminals impersonate FDIC, serve client-side exploits and malware<\/a><\/strong><br \/>\n<\/span><\/li>\n<li><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/fedex_spam_email_malware_exploits_black_hole_exploit_kit_01.png\"><strong>Spamvertised \u2018Your Fedex invoice is ready to be paid now\u2019 themed emails lead to Black Hole Exploit kit<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/10\/friendster_spam_email_social_engineering_malware_exploits_black_hole_exploit_kit_01.png\"><strong>\u2018Regarding your Friendster password\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a><\/li>\n<\/ul>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-9292\" alt=\"Paunch_Black_Hole_Exploit_Kit_Advertising_03\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_03.png\" width=\"544\" height=\"98\" \/><\/a><\/p>\n<p><strong>Sample static javascript obfuscation courtesy of Paunch&#8217;s service, and known to have been used in previously profiled malicious campaigns:<\/strong><br \/>\n<em>script&gt;try{abre++}<\/em><br \/>\n<em>script&gt;v=&#8221;va&#8221;+&#8221;l&#8221;<\/em><br \/>\n<em>script&gt;try{vfE++;}<\/em><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_04.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-9293\" alt=\"Paunch_Black_Hole_Exploit_Kit_Advertising_04\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/paunch_black_hole_exploit_kit_advertising_04.png\" width=\"488\" height=\"98\" \/><\/a><\/p>\n<p><strong>URLs known to have included the same obfuscated Javascript in the past:<\/strong><br \/>\n<em>hxxp:\/\/blue-lotusgrove.net\/main.php?page=559e008e5ed98bf7<\/em><br \/>\n<em>hxxp:\/\/dushare.net\/main.php?page=c82ec1c8d6998cf0<\/em><br \/>\n<em>hxxp:\/\/nf4.admonstr.net\/ad\/?id=735<\/em><br \/>\n<em>hxxp:\/\/forehmailywt.ontheweb.nu\/vc.php?go=2<\/em><br \/>\n<em>hxxp:\/\/blacklabelblogs.com\/fedinv.html<\/em><br \/>\n<em>hxxp:\/\/feverjoensuu.fi\/AC_RunActiveContent.js<\/em><br \/>\n<em>hxxp:\/\/hotels-in-india.in\/about-us.html<\/em><\/p>\n<p><em><\/em><strong>Sample campaign that relied on the same Javascript obfuscation:<\/strong><\/p>\n<p><em>hxxp:\/\/graciemgt.huntwalker.com\/clients.php -&gt; hxxp:\/\/mrtwimcraiprwogw.info\/in.cgi?14 &#8211; 37.59.236.138 (AS16276) &#8211; Email: davis_osburn56@saintmail.net -&gt;\u00a0hxxp:\/\/eheph.AlmostMy.COM\/hulk -&gt; hxxp:\/\/pornadvocate.com<\/em><\/p>\n<p><strong>The following malicious redirectors are known to have responsed to the same IP (37.59.236.138) in the past:<\/strong><br \/>\n<em>effehilmhgctrpia.info<\/em><br \/>\n<em>qprfhoerftcpwfoc.info<\/em><br \/>\n<em>pictptrjgmtfhwqc.info<\/em><br \/>\n<em>ijwwgrjiolhhzpwc.info<\/em><br \/>\n<em>frjwdrfjwwwreife.info<\/em><br \/>\n<em>fepzjrdeqwppzpre.info<\/em><br \/>\n<em>teihjtzmjjppzccf.info<\/em><br \/>\n<em>foppwrijcjweczgf.info<\/em><br \/>\n<em>twefwhiogaemawif.info<\/em><br \/>\n<em>wricfffjewcmricg.info<\/em><br \/>\n<em>cwwppthwwwlejiwg.info<\/em><br \/>\n<em>wdgffiapcrhpgcch.info<\/em><br \/>\n<em>dcfocihgaoffhteh.info<\/em><br \/>\n<em>zqiwfheeehfjchdi.info<\/em><br \/>\n<em>ftctwpcrrchwqdfi.info<\/em><br \/>\n<em>cwfdrdwjfwolhegi.info<\/em><br \/>\n<em>iwdddhfmozlrpewj.info<\/em><br \/>\n<em>clmrcwwhfdqghjgl.info<\/em><br \/>\n<em>fcirpfgfiwrcgjol.info<\/em><br \/>\n<em>wfhfppacfefepwzl.info<\/em><br \/>\n<em>mwpzgwoeewemfewm.info<\/em><br \/>\n<em>jtrjjfcgprmdqawo.info<\/em><br \/>\n<em>gchecwwgqwwefhgp.info<\/em><br \/>\n<em>rwhgwgjmwqffjlip.info<\/em><br \/>\n<em>whieggaowrcpiljp.info<\/em><br \/>\n<em>hdhgwwqgflwiqwtp.info<\/em><br \/>\n<em>pjjppdwhrrpjjccq.info<\/em><br \/>\n<em>hfmeqigghicwrwar.info<\/em><br \/>\n<em>hfgwlfpizfwottcr.info<\/em><br \/>\n<em>wgeffroawwfhthir.info<\/em><br \/>\n<em>effjhejwrjghrcat.info<\/em><br \/>\n<em>rwgwziiwgrwciwct.info<\/em><br \/>\n<em>lidgegrragewhdqt.info<\/em><br \/>\n<em>wwirfwqfiwizzgtt.info<\/em><br \/>\n<em>hhcdlfccqftweeew.info<\/em><br \/>\n<em>mrtwimcraiprwogw.info<\/em><br \/>\n<em>ijdewiritmhcqhcz.info<\/em><br \/>\n<em>gogopro.pro<\/em><br \/>\n<em>safeperl.net<\/em><br \/>\n<em>gogoperl.net<\/em><\/p>\n<p>What&#8217;s particularly interesting about these domains is that we have a seperate MD5 phoning back to two of these domains, namely, <strong>safeperl.net<\/strong> and <strong>gogoperl.net<\/strong>\u00a0(<a href=\"https:\/\/www.virustotal.com\/file\/0b49b4c54a204cc155c016e5606754b0fe50f02792f55460833580c68ccfebc3\/analysis\/\"><strong>MD5: 8545473E7F34B5D5A611D757D9444E3D<\/strong><\/a> &#8211; detected by 2 out of 42 antivirus scanners as Trojan-Ransom.Win32.Birele.aegw).<\/p>\n<p>This campaign is just the tip of the iceberg, and so is Paunch&#8217;s <a href=\"https:\/\/krebsonsecurity.com\/2013\/01\/crimeware-author-funds-exploit-buying-spree\/\"><strong>underground ecosystem multi-tasking projects<\/strong><\/a>. What&#8217;s for certain is the fact that, just like the majority of cybercriminals, he&#8217;s got multiple sources of revenue through &#8216;vertical market integration&#8217; development projects.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Historical cybercrime performance activity of multiple gangs and individuals has shown us that, in order for them to secure multiple revenue streams, they have the tendency to multi-task on multiple fronts while operating and serving the needs of customers within different cybercrime-friendly market segments. A logical question emerges in the context of the fact that [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12915,11341,6187,6177,12913,11733,11729,4911,11343,6189,12911,11737,11735,11731,12921,12919,12909,11747,11745,12917],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9274"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=9274"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9274\/revisions"}],"predecessor-version":[{"id":23585,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9274\/revisions\/23585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=9274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=9274"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=9274"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=9274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}