Stegano Exploit Kit Hiding Within GIF-Based Browser Ads, Remained Largely Undetected for 2 Years: Report

Advertisement
By Shekhar Thakran | Updated: 9 December 2016 18:41 IST
Highlights
  • The exploit kit was being served b major for at least two months
  • Makes use of Internet Explorer vulnerability
  • Exploit was targeting corporate sector and payment services
Stegano Exploit Kit Hiding Within GIF-Based Browser Ads, Remained Largely Undetected for 2 Years: Report

The ads that appear on websites can sometimes prove to be intrusive to a user's experience, though most major ad networks alongside modern browsers protect users from ad-based attacks. However, if new report by Eset researchers is anything to go by, a certain type of malicious ad that can steal all of the victim's information has been flying under the radar for over two years now, and has been served on major networks for at least two months now.

Eset says Stegano Exploit Kit was targeting corporate sector and especially banking services for the last two years without being detected by the major networks. The two main culprit ads highlighted by Eset belong to "Broxu" screenshot app and ironically "Browser Defence." The long-discontinued but still in use Internet Explorer is said to be the only vulnerable browser. The exploit code is hidden within layers of the GIF-based ads, and has been avoiding detection by only activating after determining the victim's machine doesn't contain sandboxes environments usually used by security researchers.

Without even requiring user interaction, the first script sends the information regarding their machine to the remote attacker and "based on server-side logic, the target is then served either a clean image or its almost imperceptibly modified malicious evil twin," Eset reports. The infected version of the graphic comes with the script encoded in the alpha channel (or transparency) of the GIF image, and as there is only a minor modification, the infected graphic is almost identical to the original.

After the new ad is placed, it runs an environment check through a javascript to make sure it is not being monitored. Another script makes use of a known Internet Explorer vulnerability CVE-2016-0162 to scan, extract, and run the code. It even ensures that it is running on an actual PC.

Advertisement

"If no indication of monitoring is detected, it creates an iframe (just one pixel in size) at coordinates off the screen, sets its window.name property (this name will be used later) and redirects to TinyURL via https. TinyURL then redirects to an exploit landing page via http. The referrer to the original site is lost during this process," Eset said.

The landing page then checks for Internet Explorer and loads a Flash file that has another Flash file within it. Depending on the version of Flash that it finds, the latter can serve one of three exploits. In order to check, it gives the information back to the server, as a GIF file. The server then returns a code to indicate one of three Flash vulnerability exploits, along with the required password shell code that allows for downloading of the final payload.

Advertisement

After performing another check to ensure it is not being detected by a security analyst, the payload is downloaded and launched. The user can then be infected with a backdoor, keylogger, screenshot maker, and video maker, Engadget points out. At this point, user's entire machine is compromised. While the Stegano exploit kit has been around for a while, no succesful exploits have been detected yet.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement
Popular Mobile Brands
  1. Vivo Y400 Pro 5G India Launch Today: All You Need to Know
  2. Oppo Reno 14 5G Series Teased to Launch in India Soon
  3. OTT Releases This Week: Ground Zero, Detective Sherdil, Found S2, and More
  4. YouTube Shorts Will Soon Let You Create AI Video Clips With Veo 3 Model
  5. Nothing Phone 3 to Get New Glyph Matrix Interface on the Rear Panel
  6. Samsung Galaxy M36 5G India Launch Date and Key Features Revealed
  7. Vodafone Idea to Bring Direct-to-Device Satellite Connectivity to India
  8. Need A Smartphone With 12 GB RAM Under 30,000 Rupees? Check out This List
  1. Samsung Galaxy Z Flip 7 Leaked Renders Suggest Edge-to-Edge Cover Display
  2. YouTube Shorts to Bring Google’s Veo 3 Video Generation Model With Audio Support 'This Summer'
  3. Samsung Galaxy Z Fold 7 Leaked Renders Hint at Design Changes; Storage Options Tipped
  4. Vivo Y400 Pro 5G Launching Today: Price in India, Expected Features and Specifications
  5. Fast Radio Bursts Reveal Universe’s Missing Matter Hidden in Cosmic Intergalactic Fog
  6. Apollo Astronauts Found Orange Glass Beads on the Moon, Scientists Now Know Why
  7. World’s Oldest Tailored Dress Found in Egyptian Tomb Dates Back Over 5,000 Years
  8. Ancient Footprints in White Sands Confirm Humans Reached America 23,000 Years Ago
  9. Humanoid Robot Achieves Controlled Flight Using Jet Propulsion and AI Systems
  10. Curiosity Rover Reaches Uyuni Quad, Begins New Mars Mapping and Surface Analysis Campaign
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.