Underminer Exploit Kit
First observed in July 2017, the Underminer exploit kit has received various sophisticated updates in recent weeks.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
First observed in July 2017, the Underminer exploit kit has received various sophisticated updates in recent weeks.
Affected platforms
The following platforms are known to be affected:
Threat details
The exploit kit employs various capabilities designed to deter reverse engineering analysis and network traffic detection, including a custom method of packaging its payloads based on the ROM file system (romfs) format.
Underminer uses a multistage system for delivering its payloads and this allows the operators to deliver custom or unique payloads depending on the campaign. It should, however, be noted that Underminer has only been observed delivering cryptocurrency mining payloads. Underminer installs a Fallout Exploit Kit is known to leverage.
Remediation steps
CVE Vulnerabilities
Last edited: 17 February 2020 1:00 pm