Your one-stop web resource providing safety and security information to manufacturers

There is a new variant of the Java exploit kit called “g01pack” that is different from others because it delivers its payload via a multistage attack.

“The first stage of the attack, the exploit shellcode, executes a second stage, in which a Java class runs in a separate Java process. This second Java process then downloads and runs the final payload,” said Amit Klein, Trusteer’s CTO who found the exploit kit.

Apache Backdoor Leads to Blackhole
Firewall Hole Found, Patched
Cogent Fixes DataHub Bugs
Mitsubishi, Clorius Holes Released

This might be the first exploit kit that uses such a technique to deliver its payload, Klein said.

What can attacker gain out o a multistage attack?

Cyber Security

Experts said by adding a “mid-course” stage to the exploit kit, it’s more likely that the attack will bypass security products.

In the tests performed by Trusteer, only 8 out of 46 tools detected the first stage JAR file as being malicious. The second stage class file ended up flagged by only two of the tools.

One attack observed by the security firm leveraged the CVE-2012-1723 Java sandbox bypass vulnerability to deliver the payload. Despite the fact this security hole ended up fixed a year ago, there are still enough computers that run unpatched versions of Java.

The implementation details of this Java exploit are similar to the ones used in the BlackHole exploit kit, but BlackHole doesn’t use this multistage approach.

The g01pack exploit kit distributes various malware families, including ZeuS, Gozi, Shylock and Torpig.

The crimekit can infect computers from all over the world. The infection rate comes in at an estimated 1:3,000 devices per month, which means the multistage approach is highly effective.

“‘g01pack’ is among the most successful exploit kits available today. It executes a ‘drive-by download’ attack that results in the silent installation of malware. Using the multi-staged attack the ‘g01pack’ exploit kit can effectively distribute advanced malware evading detection by existing security controls,” Klein said.

Pin It on Pinterest

Share This