BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

A Brief Overview of Darkleech

Post by BeyondTrust Research Team April 4, 2013

A piece of malware, Darkleech, has been making the news rounds as of late. This one targets web servers, specifically Apache 2.2.2 and above. Instead of merely compromising a web server and uploading malicious content to be served to unsuspecting victims, Darkleech goes a step further by installing a special module that is loaded by Apache and used to dynamically manipulate web pages the moment they are served to users accessing the compromised website. These web pages will redirect unsuspecting visitors of the compromised website to exploit kits like Blackhole or other malware like FakeAV or ZeroAccess, thereby compromising those users as well. Additionally, Darkleech will install a malicious SSH service onto compromised servers, so the attackers have constant access to the servers.

At this point in time, technical details about the initial infection vector are not available, other than information indicating that web administration panels (such as cPanel, Plesk, Webmin, and WordPress) have been identified as being the entry point used by attackers to gain access to servers. While these attack vectors have been observed in the wild, there are countless other ways attackers can get the malware onto a system (compromising server credentials via social engineering, exploiting other vulnerable services running on the target system, etc.). However, you can still scan your environment with Retina CS to see if there are any systems that have been possibly compromised by Darkleech. The following audit will detect Darkleech infections:
- 18630 – Possible Darkleech Infection Detected

Tags:
, , , , ,

Leave a Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,