Legitimate TDS Platform Abused to Push Malware via Exploit Kits

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,154
Threat actors abused the legitimate Keitaro Traffic Direction System (TDS) to drive traffic to malware pushing RIG and Fallout exploit kits as part of both malvertising and malspam campaigns.

A TDS is a web-based gateway designed to use various criteria to redirect users to a specific online resource. Legitimate ones like Keitaro are used by advertisers to optimize their advertising campaigns and to target specific audiences but are also known to be often leveraged by threat actors for various malicious tasks.

Keitaro, for instance, provides more than 20 filters for precise web-traffic targeting, including geolocation, mobile operator, device and browser info, timetable and more.

There are also ones specifically created to be used for illicit purposes—EITest, Seamless, Sutra, BlackOS, NinjaTDS— like redirecting potential victims to exploit kits that attempt to infect them with various malware strains.

"A Traffic Direction System (TDS) is a very useful tool for an attacker who wishes to restrict the distribution of malicious content," according to Proofpoint. "An actor running a TDS can ensure that web crawlers and security vendors are unable to see anything malicious, but real browsing users are redirected to exploits and malware."
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top