<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>EITest is a campaign initially discovered in 2014 by <a href="https://blog.malwarebytes.com/threat-analysis/2014/10/exposing-the-flash-eitest-malware-campaign/">Malwarebytes</a>. It distributes malware (that uses iframes) through a flash file on a compromised site, followed by exploitation through an Exploit Kit. In the past, this campaign was used to distribute malware including <strong>Cerber</strong>, <strong>CryptoMix</strong>, <strong>CryptoShield</strong>, <strong>Gootkit</strong> and the <strong>Chthonic</strong> banking Trojan, all using various types of Exploit Kits.<!--more--></p> <p>Even though this campaign seems to be broad, not all visitors of compromised domains are infected, according to <a href="https://blog.brillantit.com/exposing-eitest-campaign/">brillantit</a>. The host is examined before any payload is sent: Infection is only attempted for those using Google Chrome, IE and Mozilla Firefox. If the victim’s IP or HTTP host is not specified, if the User agent is not defined, or if it is related to a known Crawler (e.g. Google), the payload will not pass to the host, avoiding detection.</p> <p>&nbsp;</p> <p>One of the most recent revelations of this campaign, as reported by researcher <a href="https://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme">Kafeine</a><span>,</span> is a method that infects users of Google’s Chrome browser. It uses social engineering to find relevant users by displaying the popup message: “The HoeflerText font wasn’t found.” This includes a link to download the "unfound" object, aka the payload. This technique gives more precision to the infection attempts.</p> <p>&nbsp;</p> <p>Both ThreatSTOP IP Firewall Service and DNS Firewall Service customers are protected from the Recent Activity of EITest Campaign if they enable the TSCritical targets in their policies.</p> <p>&nbsp;</p> <p>The ThreatSTOP security team will continue monitoring this campaign and keep the protections updated. Come back to the blog to see new developments on EITest!</p></span>