<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/Magnitude%20EK/Cracked%20Earth.jpg" alt="Cracked Earth" style="display: block; margin-left: auto; margin-right: auto; width: 455px;" title="Cracked Earth" caption="false" data-constrained="true" width="455"> <p>The <strong>Magnitude EK</strong>, active since 2013, is one of the longest-running exploit kits used, with <a href="https://www.fireeye.com/blog/threat-research/2017/03/still_getting_served.html">many of its most recent victims coming from Asia</a>. It is usually seen distributing <a href="https://blog.threatstop.com/2016/06/17/cerber-ransomware-gets-stronger-adds-ddos-capabilities">Cerber ransomware</a>.</p> <!--more--> <p>It survived the downfall of other popular exploit kits of its time, but <a href="https://community.rsa.com/community/products/netwitness/blog/2017/02/09/magnitude-exploit-kit-under-the-hood">it’s not being used as widely anymore</a>, as it is no longer being publically rented out.</p> <p>Similar to other exploit kits, Magnitude uses landing pages, gates, and JavaScript as part of its infection chain. It also uses fingerprinting methods such as checking the operating system, the version of Adobe Flash that the user has installed, and the geographical location of the victim.</p> <p>Researchers refer to this process as “Magnigate,” as the exploit kit will use this information to profile the user and decide whether or not to infect them with malware.</p> <p>For example, <a href="https://www.zscaler.com/blogs/research/top-exploit-kit-activity-roundup-spring-2017">researchers at Zscaler saw</a> that one of the campaigns using Magnitude would infect people in Taiwan, but ignore users in countries like South Korea.</p> <p>Users not targeted for malware distribution will instead be served a <a href="https://www.proofpoint.com/us/threat-insight/post/magnitude-actor-social-engineering-scheme-windows-10">decoy website</a>.</p> <p>To help prevent analysis by researchers, some of the landing pages track the IP address of the user to prevent the user from being served exploits multiple times.</p> <p>Enabling <strong>TSCritical</strong><span>&nbsp;and<span>&nbsp;</span></span><strong>Drive By</strong><span><span>&nbsp;</span>targets in</span>&nbsp;policies for ThreatSTOP DNS and IP Firewall Services, protects against exploit kits like Magnitude EK. If you do not have a ThreatSTOP account,&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>