News: Cexx forums, with volunteers dedicated to helping you remove malware and stay protected
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
October 21, 2014, 00:40:45
Pages: [1]   Go Down
  Print  
Topic: Driveby downloads delivered...  (Read 5542 times)
0 Members and 1 Guest are viewing this topic.
« on: March 24, 2010, 04:28:01 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Driveby downloads delivered from ".sys" directories
- http://isc.sans.org/diary.html?storyid=8482
Last Updated: 2010-03-24 02:42:35 UTC - "... observed malware being delivered from the ".sys" directory of various web sites. The URL follows the scheme:
http ://evilexample .com/.sys/?action=... link being delivered via Facebook which of course makes the message more plausible and it is likely that users install the software thinking it came from a "Friend"... In response to clicking on the link, the user is asked to install the software... a specific block for ".sys".. web filter caught about 60% of these exploits. Once a user follows the link, additional exe files are downloaded from ".sys" directories. The file names... observed are p.exe, go.exe and v2captcha21.exe."
Comments: ... Mar 24 2010, 15:24
"... a bit more digging did show the Koobface connection..."


 Evil or Very Mad
« Last Edit: March 24, 2010, 12:47:36 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #1 on: August 23, 2010, 03:09:28 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Java exploit in the wild - Unruy downloader uses CVE-2010-0094* Java vuln
- http://blogs.technet.com/b/mmpc/archive/2010/08/17/unruy-downloader-uses-cve-2010-0094-java-vulnerability.aspx
17 Aug 2010 - "... Infection can occur when a user visits a webpage that hosts a malicious Java applet. If the user’s browser runs a vulnerable version of the Java Runtime Environment (up to version 6 update 18), exploitation may be successful and malware may be installed. We are currently detecting malicious applets that exploit this vulnerability..."

* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0094
Last revised: 08/21/2010 ... Java SE and Java for Business 6 Update 18 and 5.0 Update 23 and previous versions...
CVSS v2 Base Score: 7.5 (HIGH)

Latest version: Java JRE 6 Update 21
- http://java.sun.com/javase/downloads/index.jsp
-or-
- http://java.com/en/download/manual.jsp

 Evil or Very Mad Shocked
« Last Edit: August 23, 2010, 03:49:49 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #2 on: August 31, 2010, 04:58:31 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

* >> http://boards.cexx.org/index.php?topic=17244.msg81415#msg81415
QuickTime 7.6.8 released - September 15, 2010
___

QuickTime QTPlugin.ocx input validation vuln...
- http://secunia.com/advisories/41213/
Last Update: 2010-09-16
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution: Update to version 7.6.8*...

- http://community.websense.com/blogs/securitylabs/archive/2010/09/07/quicktime-0-day-actively-used-in-the-wild.aspx
07 Sep 2010 - "... Websense... has discovered exploitation of this vulnerability in the wild..."

- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1818
Last revised: 09/01/2010
CVSS v2 Base Score: 9.3 (HIGH)

- http://securitytracker.com/alerts/2010/Aug/1024376.html
Aug 31 2010

- http://www.symantec.com/security_response/threatconlearn.jsp
Aug. 31, 2010 - "... Users may wish to disable the QuickTime plugin until a patch is available; this can be achieved by setting the killbit for the affected control (02BF25D5-8C17-4B23-BC80-D3488ABDDC6B) -or- renaming the plugin (QTPlugin.OCX)..."

- http://www.theregister.co.uk/2010/08/30/apple_quicktime_critical_vuln/
30 August 2010 - "... exploit... works only against those who have Microsoft's Windows Live Messenger installed..."

- http://isc.sans.edu/diary.html?storyid=9472
Last Updated: 2010-08-30 23:24:53 UTC

 Shocked
« Last Edit: September 17, 2010, 07:04:33 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #3 on: September 15, 2010, 11:09:18 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Q2-2010 - 1.3M infected sites ...
- http://blog.dasient.com/2010/09/continued-growth-in-web-based-malware_9357.html
September 14, 2010 - "... our infection library has catalogued almost 200,000 different infections - up 58,000 from the previous quarter... In Q2 2010, we estimate that 1.3 million web sites were infected, based on data from our telemetry systems. Q2 was the first quarter in history for which we believe that over one million web sites were infected in a three month time period. As we have now been tracking web-based malware statistics for four quarters, we have plotted the estimated number of infected web sites over that time period below. While there was a slight dip in Q4 ‘09... the growth over the past couple quarters has been significant -  growth by a factor of two over the past year... When attackers send drive-by-downloads, they seem to like to choose one letter file names and innocent looking names like updates.exe and file.exe. Sometimes the file name starts with MS to imitate Microsoft processes. There are also a class of attacks that choose a random file name with fixed number of characters... Temp and application data folders are the favorite choice of folders in which to store malicious executables. However, executables are sometimes copied to system directory after their initial storage, and run from there... Overall, three out of four drive-by-downloads have one letter filenames and are written to the User’s Application Data directory..."

 Shocked
« Last Edit: September 15, 2010, 12:26:14 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #4 on: November 11, 2010, 07:11:35 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

IE 0-day hosted on Amnesty International site
- http://community.websense.com/blogs/securitylabs/archive/2010/11/10/Amnesty-International-Hong-Kong-Website-Injected-With-Latest-Internet-Explorer-0_2D00_day-.aspx
10 Nov 2010 - "Websense... has detected that the Hong Kong Website of human rights organization Amnesty International has been compromised by multiple exploits, including the most recent Microsoft Internet Explorer 0-day. In one attack, an iframe has been injected into the index page, resulting in a quiet redirection of any visitor to an exploit server controlled by the cyber criminals... The injected code resides at hxxp: //www .amnesty.org.hk/schi/[removed]ox.html."

> http://boards.cexx.org/index.php?topic=11831.msg81611#msg81611
___

Drive-By Downloads: Malware's Most Popular Distribution Method
- http://www.darkreading.com/taxonomy/index/printarticle/id/228200810
Nov 12, 2010

 Evil or Very Mad
« Last Edit: November 18, 2010, 12:07:39 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #5 on: November 22, 2010, 13:45:21 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Web-based malware infections double...
- http://blog.dasient.com/2010/11/normal.html
November 22, 2010 - "In Q3 Dasient continued to monitor millions of sites on the Internet for web-based malware infections and malvertisements. Based on the data gathered, we estimate that in Q3 over 1.2 million web sites across the Internet were infected, which is double our estimate from exactly one year ago... The web malware problem continues to grow dramatically as an increasing number of legitimate sites are getting infected. Looking at the major modes of communication used on the Internet, email was one of the first such major mode of communication, and we saw attackers take advantage of it by distributing viruses as email attachments. Over time, we saw that email became web-based with services such as Hotmail, Yahoo! Mail, and Gmail, and such services had to incorporate anti-virus software on their servers to scan email attachments for malware. As web page views continued to increase and web pages themselves became more and more interactive via Web 2.0 trends, cybercriminals took advantage of the advent of drive-by-download techniques to infect users without requiring the opening of attachments, thereby allowing them to exploit web pages as an increasingly pervasive malware distribution platform. While attackers continue to grow their use of almost every tool at their disposal (including spreading viruses via email attachment) and as the cybercriminal economy continues to thrive, our research indicates that the use of drive-by-downloads and rogue anti-virus schemes eclipse other modes of malware distribution..."
(Multiple charts and more detail available at the URL above.)

 Evil or Very Mad
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #6 on: November 30, 2010, 06:05:12 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Drive-by ransomware ...
- http://nakedsecurity.sophos.com/2010/11/26/drive-by-ransomware-attack-demands-120/
November 26, 2010 - "... new ransomware attack that appears to have hit computer users via a drive-by vulnerability on compromised websites. Malicious hackers are spreading the ransomware, which encrypts media and Office files on victim's computers, in an attempt to extort $120... The attack, which Sophos detects as Troj/Ransom-U*, changes your Windows desktop wallpaper to deliver the first part of the ransom message... Users have reported to us that they have received the attack via a malicious PDF which downloads and installs the ransomware. Sophos detects the PDF as Troj/PDFJS-ML**..."
* http://www.sophos.com/security/analyses/viruses-and-spyware/trojransomu.html

** http://www.sophos.com/security/analyses/viruses-and-spyware/trojpdfjsml.html

- http://www.theregister.co.uk/2010/11/30/ransomware_trojan_returns/
30 November 2010
___

MBR Ransomware
- http://www.securelist.com/en/blog/208188032/And_Now_an_MBR_Ransomware
November 29, 2010 - "... just discovered a malware which overwrites the master boot record (MBR) and demands a ransom...
UPD2: Do not use 'fixmbr' utility in case you are infected with this trojan because it will not restore your partition table and you won't be able to boot your OS. If you are infected and passwords are invalid, plug in your hard drive to a working computer and use this free tool* which will restore your MBR."
* http://support.kaspersky.com/viruses/avptool2010?level=2

Oficla downloads MBR Ransomware
- http://techblog.avira.com/2010/12/01/oficla-downloads-ransomware/en/
December 1, 2010 - "... victims which are infected can use the password “aaaaaaciip” which will restore the original MBR and Windows will start again. Avira detects the malware as TR/Ransom.Seftad.A. The malicious boot sector is detected as “BOO/Seftad.A”..."

 Evil or Very Mad
« Last Edit: December 01, 2010, 11:41:56 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #7 on: December 11, 2010, 04:16:39 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

Malware on ad networks at Google, MS...
DoubleClick ADShufffle drive-by download malvertising
- http://www.pcworld.com/businesscenter/article/213336/google_microsoft_ad_networks_briefly_hit_by_with_malware.html
12.10.2010 10:00 pm - "... cybercriminals managed to infect Google's and Microsoft's online ad networks with malicious advertisements that attacked users' PCs, according to security consultancy Armorize*. The attacks started around Dec. 5 and lasted a few days, sending victims who clicked on the ads to malicious Web pages..."
* http://blog.armorize.com/2010/12/hdd-plus-malware-spread-through.html
12.10.2010 - "... Over the past few days, we saw the quick spread of HDD Plus** - a malware that (somehow) gets installed on victim computers, and holds the computer hostage by displaying threatening message (that the system is failing), asking you to purchase a license so HDD Plus will fix the problems...  one of the means for HDD Plus to spread, was via drive-by download malvertising through (at least) DoubleClick and rad.msn .com, which are both the world's largest ad serving platforms...
Known sites affected: Sites that incorporate DoubleClick or rad.msn .com banners, including for example Scout .com (using DoubleClick), realestate.msn .com, msnbc .com (using both), and mail.live .com. We'd like to note here it's very possible that multiple exchanges, besides those listed here, have been serving the fake ADShufffle's ads...
Malware installed: Over the past week, ADShufffle kept on changing the malware. Besides HDD Plus, other types of malware, such as backdoors, have been served...
Exploit packs used: Primarily a modified version of Eleonore. Neosploit was also used. With neosploit, malicious binaries are obfuscated on-the-fly before being served..."
(More detail and flow chart available at the blog.armorize.com URL above.)

**http://www.bleepingcomputer.com/virus-removal/remove-hdd-plus
___

Q3'10... Web-Based Malware
- http://blog.dasient.com/2010_11_01_archive.html
November 22, 2010
Q1'10... Web-Based Malware
- http://blog.dasient.com/2010_05_01_archive.html
May 10, 2010

- http://news.cnet.com/8301-27080_3-20000898-245.html
March 22, 2010

- http://blog.avast.com/2010/02/18/ads-poisoning-%E2%80%93-jsprontexi/
February 18, 2010
- http://blog.avast.com/wp-content/uploads/2010/02/js_prontexi_chart.png

 Evil or Very Mad Evil or Very Mad
« Last Edit: December 11, 2010, 12:12:08 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #8 on: June 30, 2012, 13:34:06 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8341



FYI...

0-day XML in Blackhole exploit kit
- http://nakedsecurity.sophos.com/2012/06/29/zero-day-xml-core-services-vulnerability-included-in-blackhole-exploit-kit/
June 29, 2012 - "... web drive-by download attacks are responsible for the majority of user infections nowadays, and it is exploit kits that are used to construct these attacks. As soon as we see exploit kits targeting new vulnerabilities we can expect to see a lot more users getting infected - especially if the vulnerabilities are zero-days... CVE-2012-1889* exploiting code very similar to that published to Metasploit was seen within the landing page of a Blackhole exploit kit site..."

* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1889 - 9.3 (HIGH)

MS12-043 - Critical
- http://technet.microsoft.com/en-us/security/bulletin/ms12-043
Published: Jul 10, 2012 | Updated: Dec 11, 2012

 Evil or Very Mad
« Last Edit: December 29, 2012, 19:52:19 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
 
Pages: [1]   Go Up
  Print  
 
Jump to:  

Powered by SMF 1.1.20 | SMF © 2013, Simple Machines Page created in 0.615 seconds with 20 queries.