Beware the “exploit kit infection chain,” Cisco researcher warns at SecureWorld Boston Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin.“They’re in it to make money…Good customer service is important to these people,” he said, and not at all tongue in cheek, during his lunchtime address on the opening day of SecureWorld Boston this week.Antoniewicz, sporting a RUN DNS t-shirt reflecting his position with the Cisco Umbrella (formerly OpenDNS) team, dove into the topic of ransomware variants like Cerber as part of a broader talk on “An Anatomy of an Attack” and the elaborate ecosystem behind cyberattacks. As he relayed, what starts as something seemingly simple like the infiltration of a WordPress blog, often has much more serious consequences when you follow the “exploit kit infection chain.” MORE: Cisco Founders Forum is one creative way to keep & energize talentAND THE NEXT THING YOU KNOW YOU’VE GOT RANSOMWAREIn the example Antoniewicz shared, a blog showed up normally for Chrome browser users, but in the form of an error message when accessed via Microsoft Internet Explorer. “Somehow an error message is being spawned by another process outside the browser,” he said. “This is a pretty bad situation.”Clues given by the page source code show suspect code had been added in the IE view by someone who used an exploit kit to compromise the blog and potentially, visitors’ browsers and systems. Neither the blogger nor the blog’s followers would likely realize what’s going on.+ MORE FROM SECURE WORLD: Securing the modern day castle: defense in depth +“This is incredibly indicative of a specific campaign called Pseudo-Darkleech,” Antoniewicz said, that uses the “pretty awesome” – as in powerful – RIG exploit kit. It even comes with a single-pane-of -glass dashboard that attackers can use to identify victims by browser type, operating system and country of origin, among other things.Would-be attackers frequently access exploit kits on an “as a service” basis, then hit unsuspecting victims with malware such as ransomware, Antoniewicz said. “This is a whole ecosystem,” from those who hacked the blog to those who provide the exploit to those who pay to have the ransomware like Cerber Red (also called Red Cerber) installed, he said.This elaborate ecosystem gets back to Antoniewicz’s comment about the criminals who wield ransomware and their attention to providing good customer service, as in, typically freeing computers that are held hostage after a victim pays. What’s more, ransomware only locks down certain files, folders or directories — after all, the perpetrators want you to be able to use your computer to pay your ransom. “They have support forums in case you have trouble getting onto Tor, in some cases they have live chat and in one scenario they even had a dial-in number for technical support,” said the Cisco researcher, who also includes Hacker in Residence at New York University’s Tandon School of Engineering on his resume.His favorite case involved a support forum in which a victim was having all sorts of trouble getting on Tor, dealing with Bitcoin, etc., and eventually got involved in such a long thread of messages that the attacker got worn down and released the files for free.SEEKING ‘PATIENT ZERO’Antoniewicz and his peers study attacks like the one described here to better understand what Cisco customers are up against. One of the first things researchers do is try to find what he referred to as “patient zero, the first person to get infected” to learn what else on the network might have been affected. This can help vendors build signatures to detect future breaches.“When patient zero gets hit that’s not when the attack actually started,” Antoniewicz said. “There was a whole prior phase to all of this. There was when the attacker compromised that first web site. There was when the attacker had to set up the infrastructure that serves up these exploits. There’s when the attacker needs to set up reconnaissance to figure out who they’re targeting and understand the network.” Antoniewicz and his Cisco Umbrella colleagues not surprisingly examine attacks from the DNS level and he said those in the crowd could do likewise by viewing DNS logs. DNS is often overlooked, but can give you a real read on what’s happening on your network and even let you block certain connections before they are made, he said.The Cisco Umbrella team exploits machine learning and big data analytics to make sense of such data, using IP geo-location, predictive and other models. While Antoniewicz’s background is actually more on the attack side of IT security, his teammates include plenty of data scientists, and he said that’s where most security teams need to go these days to thwart emerging threats.MORE: Deep into drupal, Cisco starts to give back to open source community Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe