Angler Exploit Kit
First observed in 2013, Angler was an exploit kit responsible for delivering other high-profile malware including Andromeda, Cryptowall, Ursnif and Vawtrak. It was involved in over 40% of all exploit kit attacks at one point.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
First observed in 2013, Angler was an exploit kit responsible for delivering other high-profile malware including Andromeda, Cryptowall, Ursnif and Vawtrak. It was involved in over 40% of all exploit kit attacks at one point.
Affected platforms
The following platforms are known to be affected:
Threat details
Its creators were arrested in 2016, upon which operations using it effectively ceased.
Angler was delivered using watering hole attacks. Websites were compromised to gain access to the server running them. Once this was done, a domain generation algorithm was used to produce large amounts of subdomains, each containing Angler. Computer-generated landing pages were then created for the domains in order for them to appear as legitimate sites. This whole process was automated, allowing Angler’s operators to avoid detection whilst still effectively distributing the kit.
Alongside this, Angler used extensive code obfuscation and several anti-analysis features. System information on a variety of security and virtualisation products was collected using Internet Explorer, with deployment stopped if any were detected on a device. Angler’s main scripting function was stored as encrypted HTML data strings, which was then retrieved when the domain landing page is loaded and evading emulation layers. Payloads carried by Angler were also further encrypted.
Remediation advice
To prevent and detect an infection, ensure that:
Remediation steps
| Type | Step |
|---|---|
Identifying the source of infection:
|
Last edited: 11 January 2022 9:27 am