As some of you know, I was born in France and although now living in Canada I still keep a strong connection there.
France is a lovely country, its people… meh… maybe not so much. Anyway, vacationing in France is still a treat especially if you go down south near the sea.
The following site (www.vacancesasete.com) helps you book your vacation in the beautiful city of Sete.
It’s all good except that the site has been hacked and is infecting people who browse to it.
You can see the full report here.
You can tell they are using WordPress and determine it is version from the main page’s html:
The current and latest WordPress version is 3.1.2.
So, here is the sequence I observed when loading the page:
My guess was that one of this plugins was responsible for the malware redirect to: trip11209.cz.cc/js/jquery.min.php
The server is poorly secure as you can navigate its folder structure:
One file I had strong suspicions about is mootools-18.104.22.168-more.js. JSunpack analysis here.
I compared it with the one loaded by the site and immediately noticed a difference in size: 65.2 KB Vs 66.7 KB.
The beginning of the file is identical but at the very end is new code:
Kudos to the writer for using legit sounding variable names (var div_colors, var colors_picked).
Which gives you this:
It turns out this particular infection is really common:
Here is a look at the malicious payload:
Initial contact: trip11209.cz.cc/js/jquery.min.php (IP: 22.214.171.124; location: Frankfurt Germany)
Malicious PDF: 33129brownsvill.cz.cc/06f3bd.pdf (IP: 126.96.36.199; location: Bucharest, Romania)
Malicious Java Applet: morluzius.cz.cc/mndrtdsf.jar (Same as above)
Let’s do some digging on 188.8.131.52:
Aleea Mozaicului Nr. 4
The graph above is not actually complete. You can add ‘letbeservice.ru‘ to the list.
The ASN (AS50244) is notorious for hosting badness:
Back to our initial infection, the final payload is FakeAV, this one being called MS Removal Tool:
Virus Total detection is 7/43 (report here).
If you are infected with this rogue AV, please do not buy the license for it!
It is a pure rip-off that will cause you no end of troubles.
The payment page is hosted at: 184.108.40.206/b.php?affid= which also happens to be located in Bucharest, Romania.
ASN is AS29073. It turns out my friend Steven Burn has blogged about it before: AS29073 Ecatel: Need more proof of their being crimeware friendly?
Online criminals are raking in huge amounts of money from fake AV. They use exploit toolkits to compromise popular websites, infect computers and ‘sell’ bogus software.
There is a good read about cyber-criminals from Romania (How a Remote Town in Romania Has Become Cybercrime Central) which was published in January of 2011.
According to the story, luxury cars are plenty in this town. I thought I’d check for myself, by doing a Google Street View for Ramnicu Valcea:
Yes, a nice and shiny BMW…
Cybercrime is a billion dollar economy, no doubt about that.
Leave a reply