"x_misp_value":"2016 saw a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia\u00e2\u20ac\u2122s Federal Security Service made nearly 50 arrests last June, and then Neutrino reportedly went private and shifted to focus on select clientele in September. RIG and Sundown are now the most prominent exploit kits in circulation, gaining prominence shortly after Neutrino dropped out of active circulation.\r\n\r\nSundown is something of an outlier from typical exploit kits. It tends to reuse old exploits and doesn\u00e2\u20ac\u2122t make an effort to disguise their activity. The URLs for Sundown requests for Flash files end in .swf, while Silverlight requests end in .xap. These are the normal extensions for these file types. Typically, other exploit kits make an effort to hide their exploits. In addition, Sundown doesn\u00e2\u20ac\u2122t have the anti-crawling feature used by other exploit kits.\r\n\r\nRecent use of Sundown/RIG\r\n\r\nSundown and RIG were both in the spotlight last September when a malvertising campaign was found to be distributing the CryLocker ransomware through the two exploit kits. Researchers first detected RIG pushing this ransomware as its payload on September 1, while Sundown started doing so on September 5. CryLocker was unique in that it used Portable Network Graphic (PNG) files to package the information stolen from the infected system. The PNG file was then uploaded to an Imgur album, where ransomware operators could access it easily while evading detection.\r\n\r\nThe developers of this particular malware gave their files a valid PNG header, but no image. The file only had the system information as ASCII strings. This makes it distinct from steganography, which hides secret messages, files, or information in an image.\r\n\r\nSteganography Techniques used by Exploit Kits\r\n\r\nSteganography is an advanced technique used to hide malicious code in an image to prevent signature based detection. It\u00e2\u20ac\u2122s quite popular and has been used in several malvertising and exploit kit attacks. Earlier this year, the massive GooNky malvertising campaign used multiple techniques to hide their malvertising traffic, including moving part of malicious code into images to prevent detection. However, here the attackers didn\u00e2\u20ac\u2122t really \u00e2\u20ac\u0153hide\u00e2\u20ac\u009d the data in the picture itself \u00e2\u20ac\u201c they merely appended their malicious code at the end of the file.\r\n\r\nIn a more advanced case, Trend Micro researchers worked with colleagues in the security community to look into the steganography tactics used in the AdGholas malvertising campaign and its associated Astrum exploit kit. The campaign encoded a script into an image\u00e2\u20ac\u2122s alpha channel, which defines the transparency of the pixels. The minor modification allows the malware designer to mimic a legitimate ad, with only a slight difference in color. This makes it more difficult for these malicious ads to be spotted and analyzed.\r\n\r\nOn December 27, 2016, we noticed that Sundown was updated to use similar techniques. The PNG files weren\u00e2\u20ac\u2122t just used to store harvested information; the malware designers now used steganography to hide their exploit code."