The web site of the National Broadcasting Company (NBC), NBC.com, is currently compromised, and is redirecting tens of thousands of legitimate users to multiple exploits serving and malware dropping malicious URLs. The campaign appears to have been launched by the same gang of cybercriminals that’s also been recently involved in impersonating Facebook Inc. and Verizon Wireless, in an attempt to trick their users/customers into clicking on links found in hundreds of thousands of spamvertised emails pretending to come from the companies.
Let’s dissect the campaign, expose its structure, the dropped malware, and connect the dots on who’s behind it.
Observed iFrames in rotation:
Observed redirections leading to:
Upon successful client-side exploitation, the campaign drops MD5: 4e48ddc2a2481f9ff27113e6395160e1 – detected by 7 out of 46 antivirus scanners as Trojan-Spy.Win32.Zbot.jfgj.
Once executed the sample creates the “Xi3FVneIx” Mutex and phones back to:
hxxp://eastsidetennisassociation.com/i.htm?jzd63F1JyFUfMyyf1Q8U9 – 184.108.40.206
hxxp://envirsoft.com/n.htm?xWasESNrgozQ13QNR1PNCGTGhPAW16QJ67Bnj – 220.127.116.11 – Email: [email protected]
hxxp://beautiesofcanada.com/s.htm?2dlYtfCwTLfFBzTL8TrY7btwJDVszO – 18.104.22.168 – Email: [email protected]
hxxp://magasin-shop.com/v.htm?ZPlkcqLyyHFRxHmhVxQN8HdfszymBrXxuy – 22.214.171.124
hxxp://couche-transport.comlu.com/r.htm?Mb6kKF3mq5H8YxeVXYM9yOwK – 126.96.36.199
Second redirection redirection chain for a sampled iFrame: hxxp://moi-npovye-sploett.com/qqqq/1.php -> hxxp://moi-npovye-sploett.com/cGeQc0wz1KPI/larktion.php -> hxxp://moi-npovye-sploett.com/cGeQc0wz1KPI/aflybing.php?esusvity=785280 where it attempts to exploit CVE-2010-0188.
Malicious domains reconnaissance:
umaiskhan.com – 188.8.131.52 – Email: [email protected] – appears to be a compromised site belonging to someone named “Azhar Mahmood”, unless of course you want to believe that Pakistan’s cyber warfare unit is behind the campaign, since this is the second time that I come across to this IP. Keep reading!
priceworldpublishing.com – 184.108.40.206 – Email: [email protected]
electricianfortwayne.info – 220.127.116.11 – Email: [email protected]
gonullersultani.net – 18.104.22.168 – Email: [email protected]
erabisnis.net – 22.214.171.124
moi-npovye-sploett.com – 126.96.36.199 – Email: [email protected]
jaylenosgarage.com – 188.8.131.52
nikweinstein.com – 184.108.40.206 – Email: [email protected]
[email protected] is also known to have registered the following domains:
umaiskhan.com responds to 220.127.116.11, and on 2013-01-28 18:56:19 we know that another domain used in a Facebook Inc. themed campaign was also responding to the same IP, namely hxxp://shutterstars.com/wp-content/plugins/akismet/resume_facebook.html. The compromised legitimate host back then used to serve client-side exploits through hxxp://gotina.net/detects/sign_on_to_resume.php – 18.104.22.168 – Email: [email protected].
Deja vu! We’ve already seen and profiled this malicious domain in the following assessment “Fake ‘You’ve blocked/disabled your Facebook account’ themed emails serve client-side exploits and malware“, indicating that both of these campaigns have been launched by the same cybercriminal/gang of cybercriminals. What’s also worth emphasizing on is that the same email ([email protected]) used to register gonita.net was also profiled in the following assessment “Fake ‘Verizon Wireless Statement” themed emails lead to Black Hole Exploit Kit“, where it was used to register the Name Servers used in the campaign.
Someone’s multi-tasking. That’s for sure.
Leave a reply