Posts: 14,547
Threads: 9,568
Thanks Received: 9,059 in 7,209 posts
Thanks Given: 9,841
Joined: 12 September 18
05 September 19, 09:28
Quote:
How the new toolkit pushes malware. What to watch out for and how to stay safe.
A new toolkit has emerged in the past few days, infecting users via compromised websites.
Most of the compromised websites which are unknowingly hosting the toolkit are based on a WordPress script, which leaves them vulnerable to be exploited this way.
The toolkit has been dubbed Domen and abuses the trust of users in a classic social engineering move. Relying on the fact that most users are aware of the necessity of updates, the toolkit creators are piggyback riding on the trustworthiness of the programs they claim to represent.
When one sees a notification for a required update from a software brand they already have and trust, chances are they will approve without thinking twice. That’s how the Domen toolkit spreads and infects hosts, allowing hackers to access the infected devices remotely, to take screenshots, steal data and more.
The Domen toolkit was first discovered by security researcher Jérôme Segura, and further reported on by security researcher mol69.
How Does the Domen Toolkit Work?
The Domen Toolkit targets both PC and mobile users. So far, security researchers have discovered Domen messages being delivered in as many as 30 different languages. Besides the linguistic variety, the Domen toolkit is also remarkable in its high level of customization and sophistication.
Because of its complexity, the toolkit is able to adapt to various browsers, operating systems, clients and so on. This is what makes Domen more dangerous than the usual run-of-the-mill exploit kits abusing Flash vulnerabilities.
After an internet user visits a website infected with the Domen toolkit, they will start seeing pop-ups prompting them to install a ‘required’ software update. Those software update messages are delivered with regards to multiple software names and in 30 languages so far.
For example, here is a screenshot of a fake Chrome update prompt.
Continue Reading