![]() ![]() The main benefit of a TDS is that it allows cybercriminals to define redirection rules from an administration panel based on the type of visitors hitting the system's web of malicious landing pages. This is achieved by placing malicious scripts on compromised websites that intercept traffic or through malicious advertisements that are served to users on legitimate websites through ad networks. The goal of such traffic direction systems is to redirect legitimate web users to malware, phishing pages, tech support scams, or other malicious operations. It seems the expertise acquired over the years led to them creating their own solution dubbed Prometheus. Ma1n also previously offered web traffic redirect services via existing TDS solutions such as Blacktds and KeitaroTDS. The user has been active in the cybercrime scene since at least 2018, previously advertising mass email services and non-blacklisted business-grade SMTP servers that can be used to send hundreds of thousands of emails with proper SPF, DKIM and DMARC headers. What is Prometheus TDS?Īccording to a new report by researchers from Blackberry, Prometheus TDS appeared around September 2020 when it was advertised on an underground Russian forum by a user called Ma1n. Due to the decline of web-based exploit kits and drive-by downloads in recent years, such services have fallen out of the spotlight, but an investigation into a TDS called Prometheus shows that they still play a key role in ransomware and other malware distribution. These are networks of compromised websites and other servers whose goal is to direct victims to malware or phishing pages. One service that is often overlooked but still plays an important role in malware delivery are so-called traffic direction systems (TDS). ![]() ![]() There are the malware developers, the access brokers, the spammers, the private information sellers, the botnet operators, the malvertizers and more. Cybercrime is fueled by a complex ecosystem of criminal groups that specialize on different pieces of the final attack chains experienced by victims. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |