HanJuan Exploit Kit
Posted: June 25, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 485 |
First Seen: | June 25, 2015 |
---|---|
Last Seen: | August 28, 2022 |
OS(es) Affected: | Windows |
The HanJuan Exploit Kit is a Web-based threat that may install threatening software on your PC with exploits from other programs, such as your Web browser or Adobe's Flash platform. Recent campaigns involving the HanJuan Exploit Kit include attacks distributing banking Trojans and Trojan downloaders. Although limited samples of the HanJuan Exploit Kit are available, any exposure to this PC threat may risk compromising your PC's security, including data such as passwords. Anti-malware software can block a HanJuan Exploit Kit's attacks or remove its payload from your computer.
A Stealthy Exploit Kit Hits the Big-Time
Except for an attack involving Zero-Day (or unpatched) Flash Player vulnerabilities, the HanJuan Exploit Kit's previous history has included very limited incidents, leading to a limited sample size. However, a new campaign using the HanJuan Exploit Kit recently was confirmed for widespread distribution on the Ad.fly URL shortening service. Like its previous campaign, the Ad.fly attack used a compromised advertisement network for gaining access, followed by a chain of URL redirects eventually ending in exposure to the HanJuan Exploit Kit.
The HanJuan Exploit Kit, or HanJuan EK, loads exploits currently using vulnerabilities in Internet Explorer and Flash Player to initiate its attack that may install threats on your PC automatically. There are few or no visible signs for this attack's occurrence, which can be mitigated via blocking scripts.
The developers of the HanJuan Exploit Kit's current payloads have taken some steps to prevent malware experts from examining the Trojan, as well as blocking visible evidence of the program. The threat, identified as a variant of the minimalist Tinba Trojan (or Trojan.Agent.Fobber), injects its code into normal Windows components. It proceeds with monitoring all three Windows-favored browsers: Internet Explorer, Chrome and Firefox. So far, malware experts expect these attacks are implementing themselves with the purpose of collecting account logins and equally protected Web data.
How to Cut the Profits from Software-Exploiting Tactics
The HanJuan Exploit Kit differentiates itself from previous EKs due to its highly limited and specific usage. Despite being launched against random advertisement-viewing Web surfers, the HanJuan Exploit Kit's implementation clearly targets the most cost-efficient software platforms, with Windows owners being especially at risk. Its payloads also show clear signs of its developers being invested in the long-term security of their illicit endeavors, with multiple methods taken to obscure the threat from standard analytical techniques.
Regardless of its individual traits, the HanJuan Exploit Kit offers the same dangers to PC users as most other exploit kits. Updating all software and blocking scripted browser content (including Java, JavaScript, and Flash) by default are two steps that any PC user can take, free of charge, to protect their machines. Anti-malware products also can block attacks of a HanJuan Exploit Kit and other EKs, or remove their downloads after the fact.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.