1. Important Notice: ALWAYS login to your account using Board4all.biz - we do not own or run any other websites so please make sure you are connected to our official domain, and that you see the secure connection padlock before entering your login details.

Malware researcher have dismantled the EITest Network composed of 52,000

Discussion in 'General Chat' started by hacker7, Apr 15, 2018.

  1. hacker7

    hacker7 is a Trusted Warez Posterhacker7 @Shakrah Staff Member Super Moderator DEV Guild

    Joined:
    Dec 2, 2017
    Messages:
    2,806
    Likes Received:
    34,682
    [​IMG]
    Malware researchers from Abuse.ch, BrillantIT, and Proofpoint have sinkholed the control infrastructure behind EITest campaign and shut down it.

    Malware researchers from Abuse.ch, BrillantIT, and Proofpoint have sinkholed the control infrastructure behind EITest campaign that leveraged on a network of hacked servers exploited by crooks to distribute traffic (TDS).

    The network was used to redirect users to compromised domains hosting exploit kits, delivering malware or used for other fraudulent activities such as tech scams.

    EITest infrastructure was first discovered back in 2011, from middle 2014 crooks started using it as a TDS botnet.

    “researchers traced the chain via server side artifacts and some historical analysis of server side compromises to infections as early as 2011 when it was redirecting to a private EK known as Glazunov.wrote Proofpoint researcher Kafeine.

    “The infection chain appears to have paused between the end of 2013 and the beginning of July 2014, when it began directing into Angler

    Hackers installed a backdoor on the compromised machines and used it to redirect legitimate traffic to malicious websites, for this reason, experts defined EITest as the “king of traffic distribution.”

    “EITest is one of the longest malicious delivery campaigns that has continued to evolve. In the spring of 2017, it started redirecting Internet Explorer users to tech support scams in addition to the existing redirections with the fake Chrome fonts.” reads the analysis published “Malware don’t need coffee.” website.

    “Actors behind this campaign are generating hundreds of domains per day.The only purpose of those domains names is to redirect users to tech support scams or malicious websites.”

    According to researcher Kafeine, crooks behind the EITest campaign started selling hijacked traffic from hacked sites for $20 per 1,000 users, selling traffic blocks of 50-70,000 visitors, generating between $1,000 and $1,400 per block of traffic.

    “in the past month the activity behind this infection chain has primarily consisted of social engineering [1] and tech support scams [3] leading to ransomware.” added Kafeine.

    Early 2018, a malware a researcher at BrillantIT was able to sinkhole the botnet after discovered how to crack the way the bots contact the C&C servers.

    Read More @ affairs
     

Share This Page