<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/RIG%20EK/Get%20Me%20Out%20Of%20Here.jpg" alt="Get Me Out Of Here.jpg" width="455" height="253"> <p>Similar to <a href="https://blog.threatstop.com/terror-ek-fails-to-scare">Terror EK</a>, the <strong>RIG EK</strong> gained a lot of footing in the EK market after the downfall of the Angler, <a href="https://blog.threatstop.com/2016/08/30/security-report-neutrino-ek">Neutrino</a>, and Nuclear exploit kits.</p> <!--more--> <p>However, in the recent Shadowfall operation, researchers coordinated to take down much of the infrastructure behind RIG.</p> <p>RIG uses domain shadowing, a technique involving accessing compromised hosting accounts to create hidden subdomains on legitimate websites. Researchers believe that most of these accounts were accessed by phishing login credentials from users of the GoDaddy hosting service.</p> <p>During the takedown operation, <a href="https://www.bleepingcomputer.com/news/security/rig-exploit-kit-suffers-major-blow-following-coordinated-takedown-action/">researchers saw upwards of 450 malicious subdomains</a> being created every day, which shows the rapid rate at which the infrastructure behind these campaigns shifts to avoid detection.</p> <p>Malicious subdomains would contain a hidden JavaScript element to redirect victims through multiple domains until they landed on "gate" servers that filtered out victims based on their browser, operating system, and geographical locations. Eligible victims are then redirected to "landing pages" where the exploit itself (usually targeting Java and Flash) actually runs.</p> <p>Once this step is complete, the exploit kit will download malware such as Trojans and ransomware onto the victim's computer for execution.</p> <p>Though this operation was successful in removing tens of thousands of shadow domains, it remains to be seen if RIG will still maintain its popularity.</p> <p>Enabling <strong>TSCritical</strong>&nbsp;and <strong>Drive By</strong> targets in policies for ThreatSTOP DNS and IP Firewall Services, protects against exploit kits like the RIG EK. If you do not have a ThreatSTOP account,&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="https://docs.threatstop.com/portal_policies.html" target="_blank" rel="noopener">DNS</a> or <a href="https://docs.threatstop.com/portal_policies.html" target="_blank" rel="noopener">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our&nbsp; team.</p></span>