Thursday, February 27, 2025
HomeCVE/vulnerabilityImproved Fallout Exploit Kit - Now supports HTTPS and Flash exploit (CVE-2018-15982)

Improved Fallout Exploit Kit – Now supports HTTPS and Flash exploit (CVE-2018-15982)

Published on

SIEM as a Service

Follow Us on Google News

Fallout is an exploit kit (EK) first identified at the end of August 2018. It was first seen as a part of a malvertising campaign affecting users in Japan, Korea, the Middle East, Southern Europe, and others in the Asia Pacific.

Fallout was observed exploiting vulnerabilities CVE-2018-4878 and CVE-2018-8174 and distributing the Gandcrab ransomware to users in the Middle East.

After some gap, the fallout emerges with more exploits pack and more advanced in delivering the malwares. Fallout EK is distributed via malvertising chains (one of them we track under the name HookAds), especially through adult traffic.

The revised Fallout EK boasts several new features, including integration of the most recent Flash Player exploit. Security researchers identified that Fallout is now the second exploit kit to add CVE-2018-15982.

Fallout EK 2019 highlights:

  • HTTPS support
  • New landing page format
  • New Flash exploit (CVE-2018-15982)
  • Powershell to run payload

According to the underground advert promoting Fallout EK, “The code obfuscation and landing generation mechanism has been completely redesigned” and the exploit kit now comes with “Increased performance.” 

The same underground ad mentions the removal of the Internet Explorer CVE-2018-8373 RCE vulnerability because of its unstable flow rate.

Possibility of other payloads

The other payloads now disseminated via Fallout are Smokebot which was seen installing Azorult, Tinynuke+Azorult, Dridex, the ServHelper tunnel variant, and other malware strains not yet identified.

Indicators of Compromise

185.56.233[.]186 HookAds Campaign

51.15.35[.]154 Fallout EK

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two...