Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Security researchers from iSight and Invincea uncovered a highly sophisticated data exfiltration APT. However, the target of the digital attack was not company that was compromised; it was that site’s users. Forbes.com, one of the most highly trafficked websites in the world, was compromised and used to spread malware to site visitors.
Similarly to other website digital attacks reported in recent months, the exploitation of third-party services was the lynchpin in the digital attack. Invincea explains that is typically how these types of website compromises occur:
Many websites have vulnerable plugins, themes, and custom apps for publishing platforms- whether it is based on Cold Fusion or WordPress or common bulletin board systems. Botnets routinely probe web servers to search for known vulnerable plugins and can often exploit those vulnerabilities automatically, leaving malicious Java scripts, PHP files or Flash exploits behind.
When it comes to these exploits, there is little that can be done to prevent infection until a patch is released. Until then, they’re zero-day vulnerabilities, meaning we have zero days to respond. Zero-day exploits can exist in the wild for an indefinite amount of time before they’re discovered.
In this particular digital attack, the group responsible used a chained zero-day attack to penetrate exploit updated computers. It exploited both an IE (CVE-2015-0071) and an Adobe (CVE-2014-9163) vulnerability in order to embed a malicious DLL on victim computers.
Invincea saw no evidence that it the attack extended beyond specific targets. However, it offers this disclaimer:
While we can confirm targeting against US Defense and Financial Services firms at this time, there is potential for broader targeting from this group (and potentially other threat actors).
Although Invincea includes in the blog that the specific vulnerabilities used in this campaign were patched, the broader concern is that Alexa.com ranks Forbes.com as the 61st most popular site in the US. Millions of people read its articles and view its content on a daily basis.
How many of those people have advanced threat protection endpoint products protecting them? What’s being done to protect regular web users? Invincea covers this in its blog:
Web users are often at the mercy of the patch cycle and attentiveness of website administrators to keep these vulnerable plugins up to date and search for dropped files left behind by exploits.
Users don’t have the means to invest in best-of-bread, advanced endpoint security devices. However, they’re exposed to threats that, in order to prevent, require tools with that level of sophistication (or higher). Almost all security solutions are designed to keep digital attacks out.
This digital attack was detected because the targets had advanced endpoint detection and sophisticated threat intelligence from iSight. However, this digital attack also demonstrated the ability to target specific types of web visitors. Assuming regular people were the targets, and the goal was to spread banking malware or create bots, this digital attack could have had a much larger impact.
This isn’t the first time a major website has been penetrated, and there is nothing unique about Forbes that would make it particularly vulnerable. Factor in the scale of modern websites and all the potential penetration points — vulnerable browser plugins, themes, custom apps, malvertisements, etc. — and it becomes clear that end users are exposed to significantly higher levels of risk than most companies account for.
This problem hasn’t gotten as much attention as standard breaches have. It may not have even reached your radar as a clear and present danger to your organization. But there is a strong chance your organization will deal with this at some point, if it hasn’t already. Each new vulnerable plugin or compromised code library running on your site increases your chances of being breached, and if the group exploiting it knows what they’re doing, it will be invisible to you.
Back to RiskIQ Blog
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq