Malwarebytes uncovers malware double header

Java exploit delivers double dose of malware in first of its kind attack.

Malwarebytes security researchers claim to have discovered a new type of Java exploit kit that delivers two malwares in one attack a move they have dubbed "the split".

The Redkit exploit kit, which exploits Java vulnerabilities, was first detected in the wild in 2012.

Meanwhile, anti-virus vendor McAfee said in January that it was increasing in popularity and prevalence, but Malwarebytes now claims this is the first time it or any other exploit kit has been seen delivering two malicious codes at once.

We can expect several different malware samples within the payload, but there is a critical mass

Jerome Segura, senior security researcher at Malwarebytes, who has detailed in a blog post how the split' Redkit exploit kit was discovered, told IT Pro this technique is likely to become more popular.

"Since I started detecting this trick, I am seeing it a lot more within packet captures. For now it is still only part of the Redkit exploit kit, but it is just a matter of time before someone else copies it," Segura said.

Segura also explained that while in theory this type of split' exploit kit could contain any number of malware files, there is a limit to how many can be wrapped together before it starts to cause problems for the kit itself.

"We can expect several different malware samples within the payload, but there is a critical mass. Too many samples could start conflicting with one another and also attract attention," he claimed.

While Segura believes it is likely exploit kits will continue primarily to drop the most effective malware currently on the cyber crime market, this bundling of two or more malwares together may be used by exploit kit operators as a sideline to their main business.

"I wouldn't be surprised to see some custom type of malware, very stealth and which gets activated later on. That way the exploit kit operator can still make his money in the short term without raising suspicions from his clients' for whom he bundled ransomware, for example, while at the same time taking his share and saving it for later," Segura concluded.

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download

Recommended

New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Citrix mulling potential sale after tumultuous 2021
mergers and acquisitions

Citrix mulling potential sale after tumultuous 2021

15 Sep 2021
Hackers develop Linux port of Cobalt Strike for new attacks
Security

Hackers develop Linux port of Cobalt Strike for new attacks

14 Sep 2021