Why the Keitaro TDS keeps causing security headaches

A software company named Keitaro has long been labeled by cybersecurity vendors as a legitimate traffic distribution system vendor, yet the company's product is repeatedly used for malicious activity by cybercriminals.
Despite being described as a legitimate TDS by Microsoft and other security vendors, Keitaro has been referenced in numerous threat reports from various cybersecurity vendors and researchers over the span of at least eight years - including new reports in recent months.
Researchers say Keitaro is one of the most widely used TDSes in the threat landscape, with threat activity going beyond malvertising schemes and tech support scams that infect consumer devices.
While analyzing a large spike in activity from the exploit kit in January 2016, ThreatLabZ researchers discovered a connection to Keitaro's TDS. According to then-ThreatLabZ security researcher Ed Miles, who wrote the blog post, a Keitaro campaign was generating a significant amount of traffic to the domains of RIG and another exploit kit known as Nuclear.
Additional threat reports published in later years connected Keitaro with malicious activity and malvertising campaigns.
Abuse of Keitaro's TDS continues, according to more recent threat reports from various security vendors and researchers.
TechTarget Editorial first contacted Keitaro and its parent company Apliteni in November 2022 to ask whether Microsoft contacted them about the reported threat activity and if the company had addressed the abuse in any way.
Rud also said Keitaro is not a TDS and objected to its product being referred to as such.
Threat researchers said the Keitaro TDS continued observing such functionality.
Sherrod DeGrippo, formerly vice president of threat research and detection at Proofpoint, said that at the time of the 2019 threat report, researchers confirmed the existence of the antivirus and sandbox checks in the Keitaro TDS. However, she agreed that such antivirus checks could be used for legitimate purposes such as determining if an advertiser's content is being blocked by certain programs.
While there was no evidence that Keitaro had knowledge of the IcedID campaign, Jaramillo said the TDS has been used by multiple threat groups for many years.
Following Microsoft's DEV-0569 report and the IcedID campaigns, threat activity on Keitaro continued in 2023.
In October, the vendor published a threat on fake browser updates that analyzed three distinct campaigns using the Keitaro TDS. The first campaign featured SocGholish activity from an initial access broker Proofpoint tracks as TA569, in which the TDS redirects users from series of compromised stage 1 domains to actor-controlled stage 2 domains where the fake browser update notifications are delivered, leading to malware infections.
Larson, who co-authored the December report, said Keitaro is one of the most frequently abused TDSes it has tracked, along with 404 TDS, which is not a commercially available product.
The TDSes are primarily black market, threat actor-controlled tools such as Parrot and VexTrio's own TDSes, though the report cited one commercial product: Keitaro.
Renée Burton, head of threat intelligence at Infoblox, said the research team found no evidence to suggest Keitaro was a VexTrio partner and actively supporting the cybercrime operation.
The researchers were also able to trigger redirects by sending queries to servers running the Keitaro TDS through virtual machines, which indicates the product performed sandbox checks.
Burton said Infoblox researchers saw no evidence in the VexTrio activity that the Keitaro software had been tampered with or modified.
Currently, none of the major antimalware or threat detection vendors proactively block Keitaro by default, as is the case for BlackTDS, Prometheus, 404 and others.
Keitaro's rise in popularity among threat actors stems in large part to the fact that its TDS activity isn't flagged as malicious, Jaramillo said, and as long as that's the case, threat activity will likely continue.


This Cyber News was published on www.techtarget.com. Publication date: Tue, 09 Apr 2024 14:43:05 +0000


Cyber News related to Why the Keitaro TDS keeps causing security headaches

Why the Keitaro TDS keeps causing security headaches - A software company named Keitaro has long been labeled by cybersecurity vendors as a legitimate traffic distribution system vendor, yet the company's product is repeatedly used for malicious activity by cybercriminals. Despite being described as a ...
2 months ago Techtarget.com
Parrot TDS: A Persistent and Evolving Malware Campaign - Websites with Parrot TDS have malicious scripts injected into existing JavaScript code hosted on the server. To help the reader better understand Parrot TDS, this article provides in-depth analysis of the landing scripts and payload scripts we have ...
5 months ago Unit42.paloaltonetworks.com
CVE-2007-5289 - HP Mercury Quality Center (QC) 9.2 and earlier, and possibly TestDirector, relies on cached client-side scripts to implement "workflow" and decisions about the "capability" of a user, which allows remote attackers to execute arbitrary ...
5 years ago
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
7 months ago Microsoft.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
VexTrio network of hijacked websites used to spread malware The Register - More than 70,000 presumably legit websites have been hijacked and drafted into a network that crooks use to distribute malware, serve phishing pages, and share other dodgy stuff, according to researchers. This mesh of compromised sites is known as ...
4 months ago Go.theregister.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
Cybercrime's Silent Operator: The Unraveling of VexTrio's Malicious Network Empire - VexTrio is a massive and complex malicious TDS organization. It has a network of more than 60 affiliates that divert traffic into VexTrio, while it also operates its own TDS network. While aspects of the operation have been discovered and analyzed by ...
5 months ago Securityweek.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Vulnerability disclosure: Legal risks and ethical considerations for researchersIn this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in ...
7 months ago Helpnetsecurity.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
Malicious web redirect scripts stealth up to hide on hacked sites - Security researchers looking at more than 10,000 scripts used by the Parrot traffic direction system noticed an evolution marked by optimizations that make malicious code stealthier against security mechanisms. Parrot TDS was discovered by ...
5 months ago Bleepingcomputer.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
6 months ago Esecurityplanet.com
The 9 Most Essential API Security Tools to Protect Against Cyber Threats - Understanding the importance of API security is crucial as technological advancements across various industries continue to make our lives easier. Through APIs connecting different systems and services together, automation is becoming increasingly ...
1 year ago Csoonline.com
Application Security Testing Explained - That's precisely why application security is a top priority for security teams and a crucial consideration for DevOps. Application security testing is like giving your software a thorough health check to ensure it's robust and resilient against cyber ...
5 months ago Securityboulevard.com
BattleRoyal Cluster Signals DarkGate Surge - Security researchers have warned against the DarkGate threat actor, who has recently gained notoriety in the realm of remote access Trojans and loaders. Earlier today, Proofpoint confirmed it has been tracking a distinct operator of the DarkGate ...
6 months ago Infosecurity-magazine.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams - Stellar Cyber, a Double Platinum 'ASTORS' Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this ...
4 months ago Americansecuritytoday.com
Understanding the 2024 Cloud Security Landscape - As we swiftly move towards the second quarter of 2024, predictions by cloud security reports highlight the challenges of cloud adoption in the cloud security landscape. This growing reliance on cloud infrastructure raises the critical issue of ...
3 months ago Feeds.dzone.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
6 months ago Cybersecurity-insiders.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
6 months ago Feeds.dzone.com
Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity - Our research shows that security leaders would need to find a 40% budget increase to restore confidence in their security posture. It's unsurprising that a lack of security skills and budget - both for training as well as general cybersecurity - are ...
6 months ago Securityboulevard.com
IaaS Security: Top 8 Issues & Prevention Best Practices - Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as ...
6 months ago Esecurityplanet.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)