{"id":26463,"date":"2017-04-17T13:00:50","date_gmt":"2017-04-17T20:00:50","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=26463"},"modified":"2017-04-17T10:48:39","modified_gmt":"2017-04-17T17:48:39","slug":"traps-prevents-cerber-ransomwares-bite","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/04\/traps-prevents-cerber-ransomwares-bite\/","title":{"rendered":"Traps Prevents Cerber Ransomware's Bite"},"content":{"rendered":"<p>Unit 42 has published a number of articles over the last six months discussing the malicious campaigns, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/unit42-campaign-evolution-pseudo-darkleech-2016\/\">pseudo-Darkleech<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/01\/unit42-campaign-evolution-eitest-october-december-2016\/\">EITest<\/a>. These long-running campaigns have gone through many evolutions since their initial discovery, employing different exploit kits and techniques to avoid detection and improve attack success rates. In their most recent forms, both campaigns utilize the RIG exploit kit for the delivery of Cerber ransomware.<\/p>\n<h3>HOW DOES IT WORK?<\/h3>\n<p>Attackers running a pseudo-Darkleech campaign use a collection of legitimate websites hosting malicious scripts secretly inserted in their source code. With no particular target in mind, the attackers select random users accessing the compromised websites and load hidden iframes in the backgrounds of their pages.<\/p>\n<p>Similar to pseudo-Darkleech, attackers running an EITest campaign have no specific target in mind, and attempt to use a compromised website injected with malicious script to exploit anyone running out-of-date Windows operating systems or applications.<\/p>\n<p>When victims visit one of these compromised websites, they are forwarded to the RIG landing page, where the exploit kit fingerprints the target to determine which exploit can be served for their system. If successful, Cerber ransomware is deployed and the victim\u2019s host is infected.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Cerber_1.png\"><div style=\"max-width:100%\" data-width=\"975\"><span class=\"ar-custom\" style=\"padding-bottom:96%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-26466 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Cerber_1.png\" alt=\"cerber_1\" width=\"975\" height=\"936\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Cerber_2.png\"><div style=\"max-width:100%\" data-width=\"975\"><span class=\"ar-custom\" style=\"padding-bottom:73.23%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-26490 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Cerber_2.png\" alt=\"cerber_2\" width=\"975\" height=\"714\" \/><\/span><\/div><\/a><\/p>\n<h3>WHY IS IT UNIQUE?<\/h3>\n<p>Cerber has proven to be a powerful threat with advanced encryption and evasion capabilities. The encryption tasks can be done offline, without C2 communication; executables are continuously reloaded; and different stages of the malware are separated into multiple files, making Cerber extremely difficult to detect for most malware analysis tools.<\/p>\n<p>The longevity of these campaigns \u2013 pseudo-Darkleech since 2012 and EITest since 2014 \u2013 shows that they are reliable for attackers. Domains, IP addresses and other indicators are continuously changing, allowing them to survive the changing exploit kit landscape and remain undetected by most security solutions.<\/p>\n<h3>HOW DO YOU STOP IT?<\/h3>\n<p>Palo Alto Networks Traps uses a multi-method approach, focusing on the core techniques used by all exploit-based attacks to prevent successful exploit campaigns.<\/p>\n<p>Traps stops exploit techniques that work to manipulate memory management mechanisms and redirect applications normal execution flow before they have a chance to subvert an application. It recognizes weaponized files in the exploit attempt and stops them before they can successfully perform any malicious activity. Additionally, Traps prevents malicious code from being deployed following the exploitation stage.<\/p>\n<p>By focusing on these core exploit techniques used by attackers, Traps is able to prevent never-before-seen attacks.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\">Learn more about how Traps can stop exploit campaigns like pseudo-Darkleech and EITest.<\/a><\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><div style=\"max-width:100%\" data-width=\"820\"><span class=\"ar-custom\" style=\"padding-bottom:41.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-25356 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/ignite17-social-cover-img-facebook-820x340.png\" alt=\"ignite17-social-cover-img-facebook-820x340\" width=\"820\" height=\"340\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Ignite \u201917 Security Conference: Vancouver, BC June 12\u201315, 2017<\/strong><\/p>\n<p>Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\" rel=\"nofollow,noopener\" >Ignite website<\/a> for more information on tracks, workshops and marquee sessions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect your organization from Cerber Ransomware with Traps from Palo Alto Networks. <\/p>\n","protected":false},"author":226,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598],"tags":[603,3321,221,778],"coauthors":[2416],"class_list":["post-26463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint-2","tag-advanced-endpoint-protection","tag-cerber","tag-ransomware","tag-traps"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=26463"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26463\/revisions"}],"predecessor-version":[{"id":26523,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26463\/revisions\/26523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=26463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=26463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=26463"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=26463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}