<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><div><img src="http://info.threatstop.com/hubfs/Milkyway%20pic%20for%20Astrum%20EK.jpg" alt="Milkyway pic for Astrum EK.jpg"></div> <p><strong>Astrum <a href="http://dochub.threatstop.com/display/TS/E#E-_ek" target="_blank">Exploit Kit</a></strong>, also known as <strong>Stegano</strong>, was (until recently) exclusively used in the massive <strong>AdGholas</strong> malvertising campaign, where it distributed several types of malware, including <strong>Ursnif</strong> and <strong>RAMNIT</strong>. The <strong>AdGholas</strong> campaign, discovered in the summer of 2016, was notable for its use of <a href="https://dochub.threatstop.com/display/TS/S#S-_steganography" target="_blank">steganography</a> to hide malicious JavaScript code in ads that redirected victims to a cloned version of a legitimate website.<!--more--></p> <p>This March, malware researcher <a href="https://twitter.com/kafeine/status/845633439751720961" target="_blank">Kafeine found a new version of Astrum</a> that exploited <a href="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0022" target="_blank">CVE-2017-0022</a>. Using CVE-2017-0022, attackers were able to <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0022" target="_blank">test for the presence</a> of antivirus and malware analysis tools on a victim's computer by exploiting a vulnerability in <a href="https://www.microsoft.com/en-us/download/details.aspx?id=19662" target="_blank">Microsoft's XML Core Services</a> (<a href="https://en.wikipedia.org/wiki/MSXML" target="_blank">MSXML</a>).</p> <p>It was also updated in April to further <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/astrum-exploit-kit-abuses-diffie-hellman-key-exchange/" target="_blank">evade security researchers</a> by preventing them from replaying malicious network traffic for analysis.</p> <p><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/astrum-exploit-kit-abuses-diffie-hellman-key-exchange/" target="_blank">Research suggests</a> that the Astrum EK is not currently being used to target the general public, as the amount of traffic is very low and the payloads are not from well-known malware families.</p> <p>Enabling any of these new targets to your user policy will add protection against the associated threat to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account &nbsp;for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy" target="_blank">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall" target="_blank">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our &nbsp;team.<span style="font-size: 12.1612px; background-color: transparent;">&nbsp;</span></p></span>