Around 52,000 Malicious Command & Control Severs has been taken down that continuously spreading Malware under well-documented infection chain called EITest.
EITest is a Sophisticated Malware infection chain that basically redirects users from a compromised website into exploit kit (EK) landing pages, social engineering schemes, and potential threats.
Its one of the oldest & largest infection chains, that performed a variety of dangerous infection by distributing ransomware, information stealers, and other malware.
Recent Years EITest is one of the main sellers of malicious traffic to Exploit Kit (EK) operators and social engineering operations via compromised websites.
Also Read: Cloudflare Launches Spectrum to Protect Almost Entire Internet
Initially, during the period of 2017 researchers identified that it started using a variety of social engineering tactics and it was redirecting to a private EK known as Glazunov during 2013 and also its stared infecting rework infrastructure in the same year.
Later it directed into Angler Exploit Kit(EK) and the threat actors main motivation to spreading Zaccess Trojan and Glazunov was a private Exploit Kit(EK) used only by the EITest operators.
its reemerged again in 2014 with new infection pattern and started infecting with a new payload with 2 different categories
Accorinding to the Research that conducted by Proofpoint along with brillantit.com and abuse.ch, Based on EITest actor activity on underground forums and insights from Empire Exploit Kit(EK) we confirmed that the actor was selling traffic. In 2014, we found that the actor was selling traffic in blocks of 50-70,000 visitors for US$20 per thousand, generating between $1,000 and $1,400 per block of traffic.
Recent Main infection chain via EITest mainly for social engineering, tech support scams that lead to eventually infected by the ransomware.
Researchers create a new domain and Sinkholing (redirection of traffic from its original destination) the EITest operation that has been pointed to a new IP address.
By generating those new domains, researchers were able to substitute the malicious server with a sinkhole in order to receive the traffic from the backdoors on the compromised websites.
Later they freeing them from the EITest C&Cs and their visitors from the resulting malicious traffic and injects.
Researchers analyzing the traffic using this Sinkholing operation and observe that sinkhole received almost 44 million requests from roughly 52,000 servers between March 15 to April 4, 2018.
Aslo they decoding the malicious request and find the list of compromised domains as well as IP addresses and user agents of the users who had browsed to the compromised servers.
Those compromised websites are multiple content management systems and WordPress websites are the most infected websites.
IOC | IOC Type | Description |
54dfa1cb[.]com|31.184.192.163 | domain|ip | EITest C&C (before sinkholing) |
e5b57288[.]com|31.184.192.173 | domain|ip | EITest C&C (before sinkholing) |
33db9538[.]com|31.184.192.173 | domain|ip | EITest C&C (before sinkholing) |
9507c4e8[.]com|31.184.192.163 | domain|ip | EITest C&C (before sinkholing) |
04d92810[.]com | domain | EITest Sinkhole |
c84c8098[.]com | domain | EITest Sinkhole |
e42d078d[.]com | domain | EITest Sinkhole |
498296c9[.]com | domain | EITest Sinkhole |
stat-dns[.com | domain | Seized domain controlling the DGA |
The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national…
Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently confirmed…
A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow attackers…
Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL injection…
A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution, which…
Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two…