Jump to content

Angler Discovers Way for Evading EMET Security Kit of Microsoft


draph91

Recommended Posts

taken from here: http://www.spamfighter.com/News-20314-Angler-Discovers-Way-for-Evading-EMET-Security-Kit-of-Microsoft.htm

Exploits for Adobe Flash and Microsoft Silverlight which circumvent EMET (Enhanced Mitigation Experience Toolkit) of Microsoft now execute their operations through one revised edition of AEK (Angler Exploit Kit).

Enhanced Mitigation Experience Toolkit contains freely-obtainable tools in a package to aid Windows computers which lessen memory-based assaults. According to FireEye the security company and discoverer of the aforementioned exploits, the exploits impact solely Windows 7 computers that even now 49% of Windows operators use.

The primary function of AEK is installing the TeslaCrypt ransomware through booby-trapped Microsoft Silverlight or Adobe Flash advertisements within drive-by assaults.

Security investigators from FireEye elaborate the freshly discovered exploits within a blog as much refined when they circumvent EMET followed with subsequently attacking Silverlight or Flash Player via inserting the TeslaCrypt ransomware. For performing test of the exploit, FireEye chose solely Windows 7 as the experimental device. Scmagazine.com posted this, June 6, 2016.

And because a widely-distributed exploits can now circumvent EMET mitigations, people mustn't anymore rely on the toolkit for safeguarding previous editions of the Adobe Reader, Flash Player, Java or Silverlight applications till the time they're legitimately updated.

Disturbingly, sometimes it's forced on organizations to retain previous editions of browser plug-ins as well as other apps loaded onto endpoint PCs so that compatibility continually remains with tailored in-house Web-based apps which nobody has rewritten over many years.

Likewise in the case of Adobe Flash, AEK bypasses Export Address Table Filtering. And with the exploit for Flash, creators of AEK utilize some other methods to find recourses beyond EAF's context. So such a complicated compounding series of circumventions for bypassing DEP facilitates acquiring strong base on the intended host by the exploit that can then handover to the cyber-criminal the malevolent shellcode's control.

FireEye's experts therefore recommend organizations to fast patch their Web-browsers, Java and Adobe Flash for lowering the instances of security safeguards' circumvention. They need to also turn off their browser plug-ins related to Silverlight and Flash to be less attack prone.

Successful payloads, says FireEye, that get served through AEK include TeslaCrypt, while it isn't clear what fresh payloads Angler may serve with time.

This got me thinking if it's possible for the same thing to happen to Malwarebytes Anti-Exploit 

Link to post
Share on other sites

9 hours ago, draph91 said:

taken from here: http://www.spamfighter.com/News-20314-Angler-Discovers-Way-for-Evading-EMET-Security-Kit-of-Microsoft.htm

Quote

Exploits for Adobe Flash and Microsoft Silverlight which circumvent EMET (Enhanced Mitigation Experience Toolkit) of Microsoft now execute their operations through one revised edition of AEK (Angler Exploit Kit).

Enhanced Mitigation Experience Toolkit contains freely-obtainable tools in a package to aid Windows computers which lessen memory-based assaults. According to FireEye the security company and discoverer of the aforementioned exploits, the exploits impact solely Windows 7 computers that even now 49% of Windows operators use.

The primary function of AEK is installing the TeslaCrypt ransomware through booby-trapped Microsoft Silverlight or Adobe Flash advertisements within drive-by assaults.

Security investigators from FireEye elaborate the freshly discovered exploits within a blog as much refined when they circumvent EMET followed with subsequently attacking Silverlight or Flash Player via inserting the TeslaCrypt ransomware. For performing test of the exploit, FireEye chose solely Windows 7 as the experimental device. Scmagazine.com posted this, June 6, 2016.

And because a widely-distributed exploits can now circumvent EMET mitigations, people mustn't anymore rely on the toolkit for safeguarding previous editions of the Adobe Reader, Flash Player, Java or Silverlight applications till the time they're legitimately updated.

Disturbingly, sometimes it's forced on organizations to retain previous editions of browser plug-ins as well as other apps loaded onto endpoint PCs so that compatibility continually remains with tailored in-house Web-based apps which nobody has rewritten over many years.

Likewise in the case of Adobe Flash, AEK bypasses Export Address Table Filtering. And with the exploit for Flash, creators of AEK utilize some other methods to find recourses beyond EAF's context. So such a complicated compounding series of circumventions for bypassing DEP facilitates acquiring strong base on the intended host by the exploit that can then handover to the cyber-criminal the malevolent shellcode's control.

FireEye's experts therefore recommend organizations to fast patch their Web-browsers, Java and Adobe Flash for lowering the instances of security safeguards' circumvention. They need to also turn off their browser plug-ins related to Silverlight and Flash to be less attack prone.

Successful payloads, says FireEye, that get served through AEK include TeslaCrypt, while it isn't clear what fresh payloads Angler may serve with time.

This got me thinking if it's possible for the same thing to happen to Malwarebytes Anti-Exploit 

 

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.