Threat Level: green Handler on Duty: Brad Duncan

SANS ISC Internet Storm Center

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

BizCN gate actor update

Published: 2015-10-02
Last Updated: 2015-10-02 18:28:16 UTC
by Brad Duncan (Version: 1)
1 comment(s)


The actor using gates registered through BizCN (always with privacy protection) continues using the Nuclear exploit kit (EK) to deliver malware.

My previous diary on this actor documented the actor's switch from Fiesta EK to Nuclear EK in early July 2015 [1].  Since then, the BizCN gate actor briefly switched to Neutrino EK in September 2015 [2, 3]; however, it appears to be using Nuclear EK again.

Our thanks to Paul, who submitted a pcap of traffic by the BizCN gate actor to the ISC.


Paul's pcap showed us a Google search leading to the compromised website.  In the image below, you can also see Nuclear EK from

Shown above:  A pcap of the traffic filtered by HTTP request.

No payload was found in this EK traffic, so the Windows host viewing the compromised website didn't get infected.  The Windows host from this pcap was running IE 11, and URLs for the EK traffic stop after the last two HTTP POST requests.  These URL patterns are what I've seen every time IE 11 crashes after getting hit with Nuclear EK.

A key thing to remember with the BizCN gate actor is the referer line from the landing page.  This will always show the compromised website, and it won't indicate the BizCN-registered gate that gets you there.  Paul's pcap didn't include traffic to the BizCN-registered gate, but I found a reference to it in the traffic.  Remember, traffic from this actor always has a BizCN-registered gate.

Shown above:  Flow chart for EK traffic associated with the BizCN gate actor.

How did I find the gate in this example?  First, I checked the referer on the HTTP GET request to the EK's landing page.

Shown above:  TCP stream for the HTTP GET request to the Nuclear EK landing page.

That referer should have injected script pointing to the BizCN gate URL, so I exported that referer page from the pcap and save it as a text file.

Shown above:  How to export objects from HTTP traffic in Wireshark.

Shown above:  The object I exported from the pcap.

I searched the HTML text from the compromised website and found the BizCN gate URL as shown below.

Shown above:  Malicious script in page from the compromised website pointing to URL on the BizCN-registered gate domain.

The BizCN-registered domain was, and pinging to it showed as the IP address.  As usual, domains registered by this actor are privacy-protected.

Shown above:  Whois information on

This completes my flow chart for the BizCN gate actor.  The domains associated from Paul's pcap were:

  • - Compromised website
  • - - BizCN-registered gate
  • - - Nuclear EK

Final words

Recently, I've had hard time getting a full chain of infection traffic from the BizCN gate actor.  Paul's pcap also had this issue, because there was no payload.  However the BizCN gate actor is still active, and many of the compromised websites I've noted in previous diaries [1, 4] are still compromised. 

We continue to track the BizCN gate actor, and we'll let you know if we discover any significant changes.

Brad Duncan
Security Researcher at Rackspace
Blog: - Twitter: @malware_traffic



1 comment(s)
ISC StormCast for Friday, October 2nd 2015

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Recent trends in Nuclear Exploit Kit activity
3 days ago by Brad Duncan (0 comments)

Mistakenly-deployed test patch leads to suspicious Windows update
3 days ago by Brad Duncan (0 comments)

Tricks for DLL analysis
4 days ago by Pedro (2 comments)

"Transport of London" Malicious E-Mail
6 days ago by Johannes (4 comments)

View All Diaries →

Latest Discussions

Software to scan Cisco Network Devices
created 2 days ago by Anonymous (0 replies)

unicode test
created 3 days ago by Johannes (0 replies)

Good network security platform?
created 4 days ago by Anonymous (0 replies)

Cybersecurity Canon: a list of must-read books
created 1 week ago by Xme (1 reply)

Scammer Emails and Instant Domain Whois record Disappearance
created 2 weeks ago by Anonymous (1 reply)

View All Forums →

Latest News

View All News →