0% found this document useful (0 votes)
57 views52 pages

The Evolution of Blackhole

Blackhole Exploit Kit is the most prevalent exploit kit on the web according to Websense and Microsoft. It is constantly updated with new exploits and evasion techniques. Blackhole can be rented or purchased by attackers to install malicious payloads on vulnerable systems. It sees frequent updates to its obfuscation and uses zero-day vulnerabilities shortly after they are discovered. The kit and its author, known as Paunch, have significantly influenced the underground market for exploit kits.

Uploaded by

KrimBelkacem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views52 pages

The Evolution of Blackhole

Blackhole Exploit Kit is the most prevalent exploit kit on the web according to Websense and Microsoft. It is constantly updated with new exploits and evasion techniques. Blackhole can be rented or purchased by attackers to install malicious payloads on vulnerable systems. It sees frequent updates to its obfuscation and uses zero-day vulnerabilities shortly after they are discovered. The kit and its author, known as Paunch, have significantly influenced the underground market for exploit kits.

Uploaded by

KrimBelkacem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

THE EVOLUTION OF

BLACKHOLE
Chris Astacio
Websense
What Is An Exploit Kit
What is an exploit kit?
Collection of exploits targeting client browser or browser plugin
vulnerabilities over the web.
Drive-by download sites
Hacking for Dummies

Past exploit kits
Phoenix (PEK) dates back to 2007,Siberia, Mpack, IcePack,
Neosploit, Hierarchy
Typically fluctuating in usage and popularity
Exploits and admin relatively static
Effectiveness declines with patching

What Is Blackhole Exploit Kit?
Top exploit families detected by Microsoft anti-malware
products in the second half of 2011 and first half of 2012
What Is Blackhole Exploit Kit?
Creator of Blackhole Exploit Kit is known as "Paunch
Most prevalent on the web
Websense 65% of all exploit kit detections
Microsoft Leads exploit kit families in prevalence by factor of 2



Typical Kit
Fluctuating popularity
Exploits and admin static
Limited evasion techniques


Blackhole
King of the Kits
Constant addition of exploits
Features continually updated

How is Blackhole used?
An attacker has a binary to infect victims
Could be custom or one built from a kit like Zeus or Spyeye

The attacker licenses Blackhole Exploit Kit and specifies
various options to customize
How long?
Rent or host on your own?

Traffic is sent to Blackholes landing page via one of many
vectors
Compromised web sites
Email

How is Blackhole used?
Blackholes landing page contains obfuscated JavaScript
used to profile and possibly exploit potential victim
OS, Geolocation, Browser, Plugins

If the client browser or plugins are vulnerable to one of
Blackholes exploits, a malicious binary is loaded to infect
This is the binary created by the user of Blackhole, could be
anything for Windows infection!

Blackhole Service Options
Attacker can rent the kit
Blackhole author hosts the kit for a day, week, or month
Each of the above options also have daily limits of 50k or 70k hits

This option offloads the overhead of having to set up
hosting and installing the pack

Could benefit the attacker
Feature updates or new exploits could roll out during rental

Blackhole Service Options
Purchasing the kit is also an option
Typically, this means more overhead for the attacker
Domain registration and hosting
Kit is uploaded and installed instructions provided

License is for 3, 6, or 12 months
The purchase is also bound to a specific domain/IP
This can be removed for an additional fee

This means exploits, features, etc. are static

Backend Code Protection
Historically, some kits are ripped from others
PHP code is the same but admin panel has a different skin


Backend Code Protection
To prevent this, Blackhole Exploit Kit uses ionCube

ionCube is a legitimate PHP encoding tool
Protects source code by encoding
Provides the ability license code for a duration of time
Allows the binding of code to IP or domain

Backend Code Protection
Quote on the benefits of using ionCube
Product Developers: protect and license your code before
distribution. Time restricting is ideal for protecting evaluation
copies, and server/domain based locking helps secure revenue
from multiple domain deployments.

Vectors Of Attack
Compromised web sites


Vectors Of Attack
Injected obfuscated scripts


Vectors Of Attack
Plain English, or deobfuscated, script


Vectors Of Attack
Finally, Blackhole landing page


Vectors Of Attack
Very strong similarities between iFramer and Blackhole
Similar code structures and sometimes the same algorithm!!


Vectors Of Attack
Malicious email campaigns


Vectors Of Attack
Compromised web site


Vectors Of Attack
Finally, Blackhole landing page


Landing Page
Historically, kits change their obfuscation techniques only
on version releases
Blackhole seems to change its obfuscation, on average, every two
months!


December 2010
February 2011
March 2011 Changed 3 times!
April 2011
July 2011
September 2011
December 2011
February 2012
May 2012
June 2012
October 2012
Landing Page
First detection of Blackhole was in December 2010


Landing Page
Next change in obfuscation was February 2011


Landing Page
In March 2011 obfuscation changed 3 times!
Same algorithm just minor changes in implementation


Landing Page
Another change in April 2011


Landing Page
Next major change came in December 2011


Landing Page
February 2012


Landing Page
May 2012


Landing Page
October 2012


Landing Page
This is what the landing page currently looks like


Landing Page
Deobfuscated landing page code is quite extensive
First version of Blackhole contained just over 1,000 lines
Latest version of Blackhole contains almost 2,000 lines

Interesting client profiling code


Landing Page
Hopefully at this point youve noticed the applet code Ive
highlighted
value='e00oMDDmuXkN.Rm_NuVqRmDBVoeoju8gW6h83
value="iNN/%wwZRYX:kXErDwbE/i/BL9XY7P9Y
value="Mjjdo##JO1ZsVOsVV#wsdMdCRWfD&/W1
value="vssMlgg=9Po9Pd59PdB=gOFU6gYPMvM-Vcd=G6cr
value="rOOSqttzw5&EklEkkt?ESrSIWAfnU-An
value=http://....

These are generated by a Java Obfuscator called Allatori
In particular Allatori string encryption is being used to obfuscate
URLs in the applet code
Zero Day Bonus

Java 0-day (CVE-2012-4681) was
actually first discovered in a kit
called Gondad Exploit Kit.

Incorporated into Blackhole
within a week!

Zero Day Bonus

Java 0-day (CVE-2013-0422) was
shared on underground forums.

Paunch put it in as a New
Years Gift Brian Krebs

Admin Panel
Captcha required for login


Admin Panel
Traffic stats, load success rate, and something extra


Admin Panel
Three different advertisements shown in this panel
Iframe or script encryption services
Hosting services
Mass domain registration services



All 3 of the services seem to be targeted to Blackholes
clientele


Admin Panel
DoItQuick: a private mass registration service


Admin Panel
Crypt.am seems to also be a private encryption service


Admin Panel
Back to the admin panel, it also provides blocked stats


Admin Panel
Custom blacklisting


Admin Panel
Default set of clients to blacklist over 132k


Admin Panel
Anonymous AV checks virtest & scan4you
Have the option of changing domains after too many detections


Admin Panel
Admin panel for phone clients!
Discovered by Malware Intelligence


History of Releases

Version Release
1.0 August 2010
1.0.2 November 2010
1.1.0 June 2011
1.2.0 November 2011
1.2.1 December 2011
1.2.2 February 2012
1.2.3 March 2012
1.2.4 July 2012
2.0 September 2012
Version 2.0 Announcement
Version 2.0 Announcement
A number of new traffic blocking options
Block or allow specific referrers
Block traffic without referrers
Block based off a bot IP list
Block TOR traffic
Recording mode

Recording mode is most interesting
Assumes all traffic after your campaign is researcher or AV traffic
Adds the client IPs from this traffic to the bot IP list

Version 2.0 Announcement
Blackhole 2.0 was meant to focus more on evasion
Prevent researcher analysis and thus security detection

URL structure changes
traffic unfortunately was recognizable for AV companies and
reversers, for example, /main.php?varname=lgjlrewgjlrwbnvl2. The
new version allows for URLs you can make yourself

Disposable hosts
now generate a dynamic URL, which is valid for a few seconds,
you need only one infection

Version 2.0 Announcement
Prevent direct download of your Trojan
secure your exe, AV company can not just download it, which will
keep your exe clean as long as possible.

Captcha now used for login
Captcha entered for logging on, it was not enough to break a few
cases the admin panel of clients by Brutus

More granular detection of mobile clients
Added Win8 and mobile devices to the list of operating systems in
order to see how much of your traffic is mobile and you can redirect
to the appropriate affiliate.

Next Up for Blackhole
Ongoing updates to obfuscation

Zero Day integration
Two Java 0-day in six months time
From POC
Purchased from market

Evolution of premium kits
We are setting aside a $100K budget to purchase browser and
browser plug-in vulnerabilities, which are going to be used
exclusively by us, without being released to public (not counting the
situations, when a vulnerability is made public not because of us).



Next Up for Blackhole
Is Cool the next Blackhole?
Zero days found in Cool began showing up in Blackhole after public
announcements
Researchers began to question if the authors were the same
person

Paunch acknowledged being responsible for the Cool kit,
and said his new exploit framework costs a whopping
$10,000 a month. Brian Krebs



Blackholes ripple
From Redkit to CritXpack, Blackholes success in the
underground markets seems to be creating a market of
opportunity for others to create their own exploit kits

Kits used in malicious email campaigns are beginning to
diversify

Tools used by Blackhole are also being used by other kits
QUESTIONS?
castacio@websense.com

You might also like