What is a malicious exploit kit website?

Closed Thread
Thread Tools
  #1  
Old 07-04-2014, 05:06 AM
senior citizen senior citizen is offline
Sage
Join Date: Sep 2008
Posts: 4,813
Thanks: 0
Thanked 4 Times in 4 Posts
Default What is a malicious exploit kit website?

Any computer geeks/experts out there who might have a clue as to why when I log onto T.O.T.V. my internet security system, which is NORTON, shows this message in bottom right hand corner of my screen ?


What is a "malicious exploit kit website"........?
It's been occurring the past two weeks.
Norton takes care of it by blocking it. I'm just wondering its origin? THANK YOU.


Hisn Severity - Blocked
WEB ATTACK: Malicious Exploit Kit Website
Attacking Computer: gcattys.in.ua.64.202.116.156,80
Attacker URL: gcattys.in.ua/d9dj8h5/2
  #2  
Old 07-04-2014, 06:19 AM
Bogie Shooter Bogie Shooter is offline
Sage
Join Date: Sep 2008
Posts: 18,876
Thanks: 11
Thanked 5,368 Times in 2,396 Posts
Default

From the Internet

Defining an Exploit Kit

An exploit kit, sometimes called an exploit pack, is a toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser. Common exploit targets have been vulnerabilities in Adobe Reader, Java Runtime Environment and Adobe Flash Player.

Its interesting to see that different specialists define an exploit kit/pack a bit differently, while agreeing on the general characteristics of this type of malware.

Characteristics of Exploit Kits

A key characteristic of an exploit kit is the ease with which it can be used even by attackers who are not IT or security experts. The attacker doesnt need to know how to create exploits to benefit from infecting systems. Further, an exploit pack typically provides a user-friendly web interface that helps the attacker track the infection campaign.

Some exploit kits offer capabilities for remotely controlling the exploited system, allowing the attacker to create an Internet crimeware platform for further malicious activities.

For an overview of the key characteristics of common exploit kits, see Milas Overview of Exploit Packs, which includes a spreadsheet of exploit kit features.

Competing for Customers and Victims

An exploit kit is a launching platform used to deliver other payload, which may include a bot, a backdoor, spyware or another type of malware. In this context, exploit kit authors and distributors compete for customers.

The ease of use and affordability of exploit packs makes it possible even for people with low technical skills to become a hacker, be it for profit, politics or other reasons. The user friendliness of the control interface of the exploit kit might be one a market differentiator, helping it stand out from the competition.

Overall, its not uncommon for criminals of all shapes and sizes to battle one another for control. Im not surprised were seeing such battles in the Internet world as well. Though there are a lot of potential targets for competing attackers to infect, its natural for the attacker to wish to assert full control over newly-compromised system. If the host is already infected, the new attacker will need to remove the presence of a competing entity. Its a variation of a childrens game called King of the Hill, though obviously with more severe repercussions.

Exploit Kits and Geographic Boundaries

Some of exploit kits are developed and marketed in a specific country and, therefore, will be used more widely by attackers who speak that language or who hang out in those forums. However, the beauty of exploit kits is that they can be developed in Country A, sold in Country B, and used in Country C to attack Country D by using systems hosted in Country E. As the result, is that its hard to attribute malicious activity to actors located in a particular country by simply looking at IP addresses observed during the immediate attack.

Resisting Exploit Kit Attacks

Though some exploit packs target zero-day vulnerabilities, a large number of exploits go after vulnerabilities for which patches exist. End-users and organizations should look closely at how they keep up with security patches on the desktop. End-users at home can use auto-update mechanisms of the targeted applications or specialized tools such as Secunia PSI. Enterprise environments should use automated tools to identify vulnerable systems, install relevant patches and validate that the patches are installed. Its also important to lock down the environment so that when an individual system is affected, the attack is contained and discovered quickly.
__________________
The further a society drifts from truth the more it will hate those who speak it. George Orwell.
“Only truth and transparency can guarantee freedom”, John McCain
  #3  
Old 07-04-2014, 06:52 AM
senior citizen senior citizen is offline
Sage
Join Date: Sep 2008
Posts: 4,813
Thanks: 0
Thanked 4 Times in 4 Posts
Default Wow thank you I appreciate that.

Quote:
Originally Posted by Bogie Shooter;902***
From the Internet

Defining an Exploit Kit

An exploit kit, sometimes called an exploit pack, is a toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser. Common exploit targets have been vulnerabilities in Adobe Reader, Java Runtime Environment and Adobe Flash Player.

Its interesting to see that different specialists define an exploit kit/pack a bit differently, while agreeing on the general characteristics of this type of malware.

Characteristics of Exploit Kits

A key characteristic of an exploit kit is the ease with which it can be used even by attackers who are not IT or security experts. The attacker doesnt need to know how to create exploits to benefit from infecting systems. Further, an exploit pack typically provides a user-friendly web interface that helps the attacker track the infection campaign.

Some exploit kits offer capabilities for remotely controlling the exploited system, allowing the attacker to create an Internet crimeware platform for further malicious activities.

For an overview of the key characteristics of common exploit kits, see Milas Overview of Exploit Packs, which includes a spreadsheet of exploit kit features.

Competing for Customers and Victims

An exploit kit is a launching platform used to deliver other payload, which may include a bot, a backdoor, spyware or another type of malware. In this context, exploit kit authors and distributors compete for customers.

The ease of use and affordability of exploit packs makes it possible even for people with low technical skills to become a hacker, be it for profit, politics or other reasons. The user friendliness of the control interface of the exploit kit might be one a market differentiator, helping it stand out from the competition.

Overall, its not uncommon for criminals of all shapes and sizes to battle one another for control. Im not surprised were seeing such battles in the Internet world as well. Though there are a lot of potential targets for competing attackers to infect, its natural for the attacker to wish to assert full control over newly-compromised system. If the host is already infected, the new attacker will need to remove the presence of a competing entity. Its a variation of a childrens game called King of the Hill, though obviously with more severe repercussions.

Exploit Kits and Geographic Boundaries

Some of exploit kits are developed and marketed in a specific country and, therefore, will be used more widely by attackers who speak that language or who hang out in those forums. However, the beauty of exploit kits is that they can be developed in Country A, sold in Country B, and used in Country C to attack Country D by using systems hosted in Country E. As the result, is that its hard to attribute malicious activity to actors located in a particular country by simply looking at IP addresses observed during the immediate attack.

Resisting Exploit Kit Attacks

Though some exploit packs target zero-day vulnerabilities, a large number of exploits go after vulnerabilities for which patches exist. End-users and organizations should look closely at how they keep up with security patches on the desktop. End-users at home can use auto-update mechanisms of the targeted applications or specialized tools such as Secunia PSI. Enterprise environments should use automated tools to identify vulnerable systems, install relevant patches and validate that the patches are installed. Its also important to lock down the environment so that when an individual system is affected, the attack is contained and discovered quickly.




WOW. THANK YOU SO VERY MUCH.
I appreciate all of the information.
Norton seems to have solved the problem, but I wonder.
Sounds quite involved. Again, thanks.
  #4  
Old 07-04-2014, 07:02 AM
graciegirl's Avatar
graciegirl graciegirl is offline
Sage
Join Date: Mar 2008
Posts: 40,008
Thanks: 4,856
Thanked 5,507 Times in 1,907 Posts
Send a message via AIM to graciegirl
Default

Quote:
Originally Posted by senior citizen View Post
WOW. THANK YOU SO VERY MUCH.
I appreciate all of the information.
Norton seems to have solved the problem, but I wonder.
Sounds quite involved. Again, thanks.

I have had similar issues. It is like the common cold when you visit any large website. EXCEPT it can be very annoying and even harmful. Keep your security updates current.
__________________
It is better to laugh than to cry.
  #5  
Old 07-04-2014, 09:33 AM
villagetinker's Avatar
villagetinker villagetinker is offline
Sage
Join Date: Sep 2013
Location: Village of Pinellas
Posts: 9,676
Thanks: 2
Thanked 6,156 Times in 2,250 Posts
Default

Very interesting, I am using Norton 360 product (computers and phones) and I get no such message. Norton offers online help. I would suggest contacting Norton directly to see what the issue is.
__________________
Pennsylvania, for 60+ years, most recently, Allentown, now TV.
  #6  
Old 07-04-2014, 12:25 PM
zcaveman's Avatar
zcaveman zcaveman is offline
Eternal Member
Join Date: Jul 2007
Location: The Villages
Posts: 7,879
Thanks: 0
Thanked 4 Times in 4 Posts
Default

Quote:
Originally Posted by villagetinker View Post
Very interesting, I am using Norton 360 product (computers and phones) and I get no such message. Norton offers online help. I would suggest contacting Norton directly to see what the issue is.
I use Norton NIS and occasionally I get hit. I am glad that Norton is protecting me.

Z
__________________
Jacksonville, Florida
Andover, New Jersey
The Villages

Second star to the right, then straight on 'til morning.
  #7  
Old 07-10-2014, 06:52 AM
senior citizen senior citizen is offline
Sage
Join Date: Sep 2008
Posts: 4,813
Thanks: 0
Thanked 4 Times in 4 Posts
Default Gremlins in HP

Quote:
Originally Posted by zcaveman View Post
I use Norton NIS and occasionally I get hit. I am glad that Norton is protecting me.

Z

Yes, Norton is excellent. They have straightened out some issues.

For awhile, the "Web Attack; Malicious Exploit Kit Website" message was GONE......but now it has returned, yet only when I log onto TOTV. But, Norton pops up with the message that all is taken care of. (I'm paraphrasing that).

My main problem now is that my "d" key on the keyboard went from just sticky & problematical occasionally, to so stubborn I have to hold it down forever until it works again.

I discovered that I have an "onscreen keyboard" which has been a Godsend temporarily.

My husband vacuumed out my entire keyboard but it is still STUCK.

I read on "Ask How" whereby you can remove the troublesome key from the keyboard and replace it with a new "d" key.

I will let my husband attempt that. If he cannot, then we will bring it down to Staples to their repair department.

This is a relatively NEW computer. Made in China.
Top of the line HP. Oh well.
  #8  
Old 07-10-2014, 07:16 AM
graciegirl's Avatar
graciegirl graciegirl is offline
Sage
Join Date: Mar 2008
Posts: 40,008
Thanks: 4,856
Thanked 5,507 Times in 1,907 Posts
Send a message via AIM to graciegirl
Default

Quote:
Originally Posted by senior citizen View Post
Yes, Norton is excellent. They have straightened out some issues.

For awhile, the "Web Attack; Malicious Exploit Kit Website" message was GONE......but now it has returned, yet only when I log onto TOTV. But, Norton pops up with the message that all is taken care of. (I'm paraphrasing that).

My main problem now is that my "d" key on the keyboard went from just sticky & problematical occasionally, to so stubborn I have to hold it down forever until it works again.

I discovered that I have an "onscreen keyboard" which has been a Godsend temporarily.

My husband vacuumed out my entire keyboard but it is still STUCK.

I read on "Ask How" whereby you can remove the troublesome key from the keyboard and replace it with a new "d" key.

I will let my husband attempt that. If he cannot, then we will bring it down to Staples to their repair department.

This is a relatively NEW computer. Made in China.
Top of the line HP. Oh well.

Some advice. Don't go on Topix. You can get ugly things there.
__________________
It is better to laugh than to cry.
  #9  
Old 07-10-2014, 09:49 AM
senior citizen senior citizen is offline
Sage
Join Date: Sep 2008
Posts: 4,813
Thanks: 0
Thanked 4 Times in 4 Posts
Default The one & only place it shows up is T.O.T.V. website

Quote:
Originally Posted by graciegirl View Post
Some advice. Don't go on Topix. You can get ugly things there.
The one & only place it shows up is T.O.T.V. website......
Have you encountered it on Topix???

Norton took care of it twice .......
Severity: High

No further action is required but you may wish to perform some of the following actions as a precautionary measure.
Run the Norton Power Eraser. (home users)
Run the Symantec Power Eraser. (business users)
Update your product definitions and perform a full system scan.
Identify suspicious files.
Submit suspicious files to Symantec for analysis.

An exploit kit is a drive-by download attack that looks for unpatched vulnerabilities in your operating system and programs, that can be used to install malware without any action on your part.

Norton detected the threat and blocked it. You may want to run LiveUpdate and scan your system just to be certain that nothing managed to slip though, but otherwise there is no cause for concern and really nothing else you need to do.

Note that Norton blocked the threat at the initial stage - the exploit kit. In order to infect your system the kit would still have needed to find a vulnerable program, launch the exploit and install the malicious payload.

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities

Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
















 

  #10  
Old 07-10-2014, 10:36 AM
TOTV Team's Avatar
TOTV Team TOTV Team is offline
Administrator
Join Date: Nov 2009
Posts: 8,769
Thanks: 53
Thanked 204 Times in 43 Posts
Default

We have had the server and site scanned multiple times and there is nothing found. We'll monitor all feedback and continue to provide to the host company.
  #11  
Old 07-10-2014, 11:56 AM
Indydealmaker's Avatar
Indydealmaker Indydealmaker is offline
Soaring Eagle member
Join Date: Jun 2010
Location: Bonita
Posts: 2,387
Thanks: 143
Thanked 296 Times in 158 Posts
Default Microsoft Defender

I use the free Microsoft Defender (part of Windows 8) and am not seeing any of these error messages. I also occasionally scan with Malwarebytes for NSA bugs.
__________________
Real Name: Steven Massy Arrived at TV through Greenwood, IN; Moss Beach, CA; La Grange, KY; Crystal River, FL; The Villages, FL
Closed Thread


You are viewing a new design of the TOTV site. Click here to revert to the old version.

All times are GMT -5. The time now is 06:06 AM.