{"id":11973,"date":"2018-04-10T08:10:07","date_gmt":"2018-04-10T16:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/10\/news-5742\/"},"modified":"2018-04-10T08:10:07","modified_gmt":"2018-04-10T16:10:07","slug":"news-5742","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/10\/news-5742\/","title":{"rendered":"&#8216;FakeUpdates&#8217; campaign leverages multiple website platforms"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 10 Apr 2018 15:00:00 +0000<\/strong><\/p>\n<p>A malware campaign which seems to have started at least since December 2017 has been gaining steam by enrolling a growing number of legitimate but compromised websites. Its modus operandi relies on social engineering users with fake but convincing update notifications.<\/p>\n<p>Similar techniques were used by a group leveraging <a href=\"https:\/\/executemalware.com\/?p=432\" target=\"_blank\" rel=\"noopener\">malvertising on high traffic websites such as Yahoo<\/a> to distribute ad fraud malware. The patterns are also somewhat reminiscent of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/\" target=\"_blank\" rel=\"noopener\">EITest&#8217;s HoeflerText campaign<\/a> where hacked websites are scrambled and offer a font for download. More recently, there has been a <a href=\"https:\/\/blog.sucuri.net\/2018\/03\/github-hosts-lokibot-infostealer.html\" target=\"_blank\" rel=\"noopener\">campaign affecting Magento websites<\/a>\u00a0that also pushes fake updates (for the Flash Player) which delivers the <a href=\"https:\/\/blog.sucuri.net\/2018\/03\/github-hosts-infostealers-part-2-cryptominers-and-credit-card-stealers.html\" target=\"_blank\" rel=\"noopener\">AZORult stealer by abusing GitHub for hosting<\/a>.<\/p>\n<p>Today, we are looking at what we call the &#8216;FakeUpdates campaign&#8217; and describing its intricate filtering and evasion techniques.\u00a0One of the earliest examples we could find was <a href=\"http:\/\/www.broadanalysis.com\/2017\/12\/20\/fake-flash-player-update-delivers-net-support-rat\/\" target=\"_blank\" rel=\"noopener\">reported by BroadAnalysis<\/a> on December 20, 2017. The update file is not an executable but rather a script which is downloaded from DropBox, a legitimate file hosting service, as can be seen in the animation below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22989\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/_redirect\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirect.gif\" data-orig-size=\"1004,759\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"_redirect\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirect-300x227.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirect-600x454.gif\" class=\"size-full wp-image-22989 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirect.gif\" alt=\"\" width=\"1004\" height=\"759\" \/><\/p>\n<p style=\"text-align: center\"><em>Figure 1: A typical redirection to the &#8216;FakeUpdates&#8217; scheme from a hacked site<\/em><\/p>\n<p>This campaign affects multiple Content Management Systems (CMS) in somewhat similar ways. Several of the websites we checked were outdated and therefore vulnerable to malicious code injection. It is possible that attackers used the same techniques to build their inventory of compromised sites but we do not have enough information to confirm this theory.<\/p>\n<h3>WordPress and\u00a0Joomla<\/h3>\n<p>Both WordPress and Joomla sites that were hacked bear the same kind of injection within their CMS&#8217; JavaScript files.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23018\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/wp_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_.png\" data-orig-size=\"789,412\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"WP_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_-300x157.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_-600x313.png\" class=\"size-full wp-image-23018 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_.png\" alt=\"\" width=\"789\" height=\"412\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_.png 789w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_-300x157.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_-600x313.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WP_-630x330.png 630w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: A Compromised WordPress site pushing a fake Google Chrome update<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23019\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/joomla_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_.png\" data-orig-size=\"788,395\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Joomla_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_-300x150.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_-600x301.png\" class=\"size-full wp-image-23019 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_.png\" alt=\"\" width=\"788\" height=\"395\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_.png 788w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_-300x150.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Joomla_-600x301.png 600w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3:\u00a0A Compromised Joomla site pushing a fake Mozilla Firefox update<\/em><\/p>\n<p>Some commonly injected files include the <em>jquery.js<\/em> and <em>caption.js<\/em> libraries where code is typically appended and can be spotted by doing a comparison with a clean copy of the same file.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23052\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/compare-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare.png\" data-orig-size=\"680,324\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compare\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare-300x143.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare-600x286.png\" class=\"size-full wp-image-23052 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare.png\" alt=\"\" width=\"680\" height=\"324\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare.png 680w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare-300x143.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compare-600x286.png 600w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4: Diffing a clean and suspicious copy of the same library<\/em><\/p>\n<p>The additional blurb of code is responsible for the next chain of events that loads the fraudulent layer onto the website you are visiting. The image below shows a beautified version of the code injected in the CMS platforms, whose goal is to call the redirection URL:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23137\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/injected_code_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_.png\" data-orig-size=\"621,758\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"injected_code_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_-246x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_-492x600.png\" class=\"size-full wp-image-23137 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_.png\" alt=\"\" width=\"621\" height=\"758\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_.png 621w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_-246x300.png 246w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/injected_code_-492x600.png 492w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 5: Injected code responsible for the redirection<\/em><\/p>\n<p>We wrote a simple crawler to browse a list of sites and then parsed the results. We were able to identify several hundred compromised WordPress and Joomla websites even after a small iteration through the list. Although we don&#8217;t have an exact number of sites that are affected, we surmise that it is in the thousands.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23087\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/compromised_cms\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS.png\" data-orig-size=\"897,661\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"compromised_CMS\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS-300x221.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS-600x442.png\" class=\"size-full wp-image-23087 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS.png\" alt=\"\" width=\"897\" height=\"661\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS.png 897w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS-300x221.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/compromised_CMS-600x442.png 600w\" sizes=\"auto, (max-width: 897px) 100vw, 897px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 6: A partial list of compromised sites<\/em><\/p>\n<h3>Squarespace<\/h3>\n<p>Squarespace is another popular Content Management System that is also affected by the same campaign. This was <a href=\"https:\/\/twitter.com\/Ring0x0\/status\/976613052606046208\" target=\"_blank\" rel=\"noopener\">pointed out<\/a> by <a href=\"https:\/\/twitter.com\/Ring0x0\/\" target=\"_blank\" rel=\"noopener\">@Ring0x0<\/a>\u00a0and we found a <a href=\"https:\/\/answers.squarespace.com\/questions\/211413\/site-was-hacked-site-bundlejs-changes-in-git-histo.html\" target=\"_blank\" rel=\"noopener\">forum post<\/a> dated February 28, where a Squarespace user is asking for help, saying &#8220;<em>it basically redirected me to a full page &#8220;your version of chrome needs updating<\/em>&#8220;&#8221;.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22992\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/squarespace_chrome\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome.png\" data-orig-size=\"1073,804\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SquareSpace_Chrome\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome-600x450.png\" class=\"size-full wp-image-22992 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome.png\" alt=\"\" width=\"1073\" height=\"804\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome.png 1073w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SquareSpace_Chrome-600x450.png 600w\" sizes=\"auto, (max-width: 1073px) 100vw, 1073px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 7: A Squarespace user reporting that their sites was tampered with<\/em><\/p>\n<p style=\"text-align: left\">So I login to the admin panel and in the GIT HISTORY it shows that one of my users which has never even logged in before, has sent an upload: site-bundle.js last week, along with some other big list of files {sic}.<\/p>\n<p>We dug deeper into these compromises and identified a slightly different redirection mechanism than the one used on WordPress or Joomla sites. With Squarespace, a blurb of JavaScript is injected directly into the site&#8217;s homepage instead.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23022\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/squarespace_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_.png\" data-orig-size=\"788,464\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Squarespace_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_-300x177.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_-600x353.png\" class=\"size-full wp-image-23022 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_.png\" alt=\"\" width=\"788\" height=\"464\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_.png 788w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_-300x177.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Squarespace_-600x353.png 600w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 8: Traffic showing a malicious redirection taking place on a Squarespace site<\/em><\/p>\n<p>It pulls a source file from <em>query[.]network<\/em> that in turn retrieves <em>bundle.js<\/em> from <em>boobahbaby[.]com<\/em>:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22996\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/redir_squarespace\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace.png\" data-orig-size=\"641,320\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"redir_SquareSpace\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace-300x150.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace-600x300.png\" class=\"size-full wp-image-22996 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace.png\" alt=\"\" width=\"641\" height=\"320\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace.png 641w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace-300x150.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redir_SquareSpace-600x300.png 600w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 9: The injected code present in hacked Squarespace sites\u00a0<\/em><\/p>\n<p><em>bundle.js<\/em> contains the same script we described earlier that is used to call the redirection URL:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23051\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/redirection_url\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL.png\" data-orig-size=\"590,411\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"redirection_URL\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL-300x209.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL.png\" class=\"size-full wp-image-23051 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL.png\" alt=\"\" width=\"590\" height=\"411\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL.png 590w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/redirection_URL-300x209.png 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 10: The same redirection code used in WP and Joomla infections is used here<\/em><\/p>\n<p>According to this <a href=\"https:\/\/publicwww.com\/websites\/%22%2Fjquery%3Ffrm%3Dscript%26se_referrer%22\/\" target=\"_blank\" rel=\"noopener\">PublicWWW query<\/a>, a little over 900 SquareSpace sites have been injected with this malicious redirection code.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23021\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/publicwww_stats_squarespace\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace.png\" data-orig-size=\"1158,358\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"publicwww_stats_squarespace\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace-300x93.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace-600x185.png\" class=\"size-full wp-image-23021 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace.png\" alt=\"\" width=\"1158\" height=\"358\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace.png 1158w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace-300x93.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/publicwww_stats_squarespace-600x185.png 600w\" sizes=\"auto, (max-width: 1158px) 100vw, 1158px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 11: Identifying other hacked Squarespace sites using a string pattern<\/em><\/p>\n<h3>Redirection URL and filtering<\/h3>\n<p>All CMSes trigger redirection URIs with similar patterns that eventually load the fraudulent update theme. Based on our tests, the URIs have identifiers that apply to a particular CMS; for example <em>cid=221<\/em> is associated with WordPress sites, while <em>cid=208<\/em> with Joomla.<\/p>\n<pre><strong>WordPress<\/strong>   <em>track.positiverefreshment[.]org\/s_code.js?cid=<strong>221<\/strong>&amp;v=<strong>8fdbe4223f0230a93678  <\/strong>track.positiverefreshment.org\/s_code.js?cid=<strong>225<\/strong>&amp;v=<strong>0bbea7365fbb07c7acb3   <\/strong>track.amishbrand[.]com\/s_code.js?cid=<strong>205<\/strong>&amp;v=<strong>c40bfeff70a8e1abc00f   <\/strong>track.amishbrand.com\/s_code.js?cid=<strong>228<\/strong>&amp;v=<strong>e8bfa92965d1d880bac2   <\/strong>track.amishbrand[.]com\/s_code.js?cid=<strong>234<\/strong>&amp;v=<strong>59f4ba6c3cd7f37abedc<\/strong>   track.amishbrand[.]com\/s_code.js?cid=<strong>237<\/strong>&amp;v=<strong>7e3403034b8bf0ac23c6<\/strong><\/em>     <strong>Joomla<\/strong>   <em>connect.clevelandskin[.]com\/s_code.js?cid=<strong>208<\/strong>&amp;v=<strong>e1acdea1ea51b0035267<\/strong>   track.positiverefreshment[.]org\/s_code.js?cid=<strong>220<\/strong>&amp;v=<strong>24eca7c911f5e102e2ba   <\/strong>track.amishbrand[.]com\/s_code.js?cid=<strong>226<\/strong>&amp;v=<strong>4d25aa10a99a45509fa2<\/strong><\/em>     <strong>SquareSpace<\/strong>   <em>track.amishbrand[.]com\/s_code.js?cid=<strong>232<\/strong>&amp;v=<strong>47acc84c33bf85c5496d     <\/strong><\/em><strong>Open Journal Systems<\/strong><em>   track.positiverefreshment[.]org\/s_code.js?cid=<strong>223<\/strong>&amp;v=<strong>7124cc38a60ff6cb920d<\/strong>     <strong>Unknown CMS<\/strong>   track.positiverefreshment[.]org\/s_code.js?cid=<strong>211<\/strong>&amp;v=<strong>7c6b1d9ec5023db2b7d9   <\/strong>track.positiverefreshment[.]org\/s_code.js?cid=<strong>227<\/strong>&amp;v=<strong>a414ad4ad38395fc3c3b<\/strong><\/em><\/pre>\n<p>There are other interesting artifacts on this infrastructure, such as an ad rotator:<\/p>\n<pre>track.positiverefreshment.net:81\/adrotator\/banner.js?cid=100<\/pre>\n<p>But if we focus on the redirection code itself, we notice that potential victims are fingerprinted and the ultimate redirection to the FakeUpdates template is conditional, in particular with only one hit per single IP address. The last JavaScript is responsible for creating the iframe URL to that next sequence.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23041\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/iframe-16\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe.png\" data-orig-size=\"769,784\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"iframe\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe-294x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe-589x600.png\" class=\"size-full wp-image-23041 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe.png\" alt=\"\" width=\"769\" height=\"784\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe.png 769w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe-294x300.png 294w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/iframe-589x600.png 589w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 12: Fingerprinting, cookie verification and iframe redirection are performed here<\/em><\/p>\n<h3>FakeUpdates theme<\/h3>\n<p>There are templates for the Chrome, Firefox and Internet Explorer browsers, the latter getting a bogus Flash Player update instead.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/#gallery-22954-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p style=\"text-align: center\"><em>Figure 13: Attackers are targeting browsers with professional looking templates<\/em><\/p>\n<p>The decoy pages are hosted on compromised hosts via sub-domains using URIs with very short life spans. Some of those domains have a live (and legitimate website) whereas others are simply parked:<\/p>\n<p>Legitimate (shadowed) domain:<\/p>\n<pre>https:\/\/pask.spgolfshoes[.]com\/95b40f61578eed04ff464c5055990abbupdate{trimmed}<\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23026\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/legitdomain\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain.png\" data-orig-size=\"708,361\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"legitdomain\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain-300x153.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain-600x306.png\" class=\"size-full wp-image-23026 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain.png\" alt=\"\" width=\"708\" height=\"361\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain.png 708w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain-300x153.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/legitdomain-600x306.png 600w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 14: This property&#8217;s credentials have most likely been stolen and used to register a malicious subdomain<\/em><\/p>\n<p>Parked domain:<\/p>\n<pre>http:\/\/zlsk.redneckonize[.]com\/wordpress\/article.php?f=445327&amp;g={trimmed}<\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23027\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/parked-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked.png\" data-orig-size=\"710,363\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"parked\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked-300x153.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked-600x307.png\" class=\"size-full wp-image-23027 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked.png\" alt=\"\" width=\"710\" height=\"363\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked.png 710w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked-300x153.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/parked-600x307.png 600w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 15: Parked domains can hide ulterior\u00a0motives<\/em><\/p>\n<h3>Final infection chain and payloads<\/h3>\n<p>The infection starts with the fake update disguised as a JavaScript file retrieved from\u00a0the Dropbox file hosting service. The link to Dropbox, which is\u00a0updated at regular intervals, is obfuscated inside of the the first web session belonging to the fake theme.<br \/> <img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23084\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/dropbox_uri\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI.png\" data-orig-size=\"599,542\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Dropbox_URI\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI-300x271.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI.png\" class=\"size-full wp-image-23084 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI.png\" alt=\"\" width=\"599\" height=\"542\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI.png 599w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dropbox_URI-300x271.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p style=\"text-align: center\"><em>Figure 16: the fileURL variable contains the Dropbox URL<\/em><\/p>\n<p>This JavaScript is heavily obfuscated to make static analysis very difficult and also to hide some crucial fingerprinting that is designed to evade virtual machines and sandboxes.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS.png\" data-rel=\"lightbox-13\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23053\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/obfuscated_js\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS.png\" data-orig-size=\"650,585\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"obfuscated_JS\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS-300x270.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS-600x540.png\" class=\"size-full wp-image-23053 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS.png\" alt=\"\" width=\"650\" height=\"585\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS.png 650w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS-300x270.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/obfuscated_JS-600x540.png 600w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 17: The malicious JavaScript downloaded from DropBox<\/em><\/p>\n<p>According to this very good and detailed <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/04\/fake-software-update-abuses-netsupport-remote-access-tool.html\" target=\"_blank\" rel=\"noopener\">analysis of the JS file<\/a>, this is because step2 of the victim&#8217;s profiling uses WScript.Network and WMI to collect system information (BIOS, manufacturer, architecture, MAC address, processes, etc) and eventually makes the decision to continue with the payload or end the script without delivering it.<\/p>\n<p>A failed infection will only contain 2 callbacks to the C2 server:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed.png\" data-rel=\"lightbox-14\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23056\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/failed\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed.png\" data-orig-size=\"715,747\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"failed\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed-287x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed-574x600.png\" class=\"size-full wp-image-23056 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed.png\" alt=\"\" width=\"715\" height=\"747\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed.png 715w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed-287x300.png 287w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/failed-574x600.png 574w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 18: A host that is not a genuine machine was detected and infection aborted<\/em><\/p>\n<p>While a successful infection will contain 3 callbacks to the C2 server (including the payload):<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful.png\" data-rel=\"lightbox-15\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23085\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/successful\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful.png\" data-orig-size=\"716,859\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"successful\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful-250x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful-500x600.png\" class=\"size-full wp-image-23085 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful.png\" alt=\"\" width=\"716\" height=\"859\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful.png 716w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful-250x300.png 250w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/successful-500x600.png 500w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 19: When all checks pass, the user is served the payload<\/em><\/p>\n<p>The encoded payload stream is decoded by <em>wscript.exe<\/em> and a malicious binary (<em>Chrome_71.1.43.exe <\/em>in this case), dropped in the %temp% folder. That file was digitally signed and also employed various evasion techniques (such as an immediate reboot) to defeat sandboxes.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed.png\" data-rel=\"lightbox-16\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23035\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/signed-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed.png\" data-orig-size=\"459,627\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"signed\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed-220x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed-439x600.png\" class=\"size-full wp-image-23035 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed.png\" alt=\"\" width=\"459\" height=\"627\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed.png 459w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed-220x300.png 220w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/signed-439x600.png 439w\" sizes=\"auto, (max-width: 459px) 100vw, 459px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 20: A digitally\u00a0signed file is no guarantee for safety<\/em><\/p>\n<p>Upon examination, we determined that this is the Chtonic banking malware, a variant of ZeusVM. Once the system has restarted, Chtonic retrieves a hefty configuration file from\u00a094.100.18[.]6\/3.bin.<\/p>\n<p>In a second replay attempt, we got the NetSupport Remote Access Tool, a commercial RAT instead. Its installation and configuration were already well covered in this <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/04\/fake-software-update-abuses-netsupport-remote-access-tool.html\" target=\"_blank\" rel=\"noopener\">blog<\/a>. Once again, we noticed the heavy use of obfuscation throughout the delivery of this program that can be used for malicious purposes (file transfer, remote Desktop, etc.).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT.png\" data-rel=\"lightbox-17\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23076\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/attachment\/netsupport_rat\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT.png\" data-orig-size=\"749,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetSupport_RAT\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT-300x288.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT-600x577.png\" class=\"size-full wp-image-23076 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT.png\" alt=\"\" width=\"749\" height=\"720\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT.png 749w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT-300x288.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/NetSupport_RAT-600x577.png 600w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 21: Traffic from the RAT infection, showing its backend server<\/em><\/p>\n<h3>Conclusion<\/h3>\n<p>This campaign relies on a delivery mechanism that leverages social engineering and abuses a legitimate file hosting service. The &#8216;bait&#8217; file consists of a script rather than a malicious executable, giving the attackers the flexibility to develop interesting obfuscation and fingerprinting techniques.<\/p>\n<p>Compromised websites were abused to not only redirect users but also to host the fake updates scheme, making their owners unwitting participants in a malware campaign. This is why it is so important to keep Content Management Systems up to date, as well as use good security hygiene when it comes to authentication.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> blocks the domains and servers used in this attack, as well as the final payload.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p><strong>Redirection infrastructure:<\/strong><\/p>\n<pre>23.152.0[.]118  84.200.84[.]236  185.243.112[.]38  eventsbysteph[.]com  query[.]network  connect.clevelandskin[.]net  connect.clevelandskin[.]org  track.amishbrand[.]com  track.positiverefreshment[.]org  <\/pre>\n<p><strong>Dropped binaries:<\/strong><\/p>\n<p><strong>Chtonic<\/strong><\/p>\n<pre>6f3b0068793b277f1d948e11fe1a1d1c1aa78600712ec91cd0c0e83ed2f4cf1f  94.100.18[.]6\/3.bin<\/pre>\n<p><strong>NetSupport RAT<\/strong><\/p>\n<pre>4d24b359176389301c14a92607b5c26b8490c41e7e3a2abbc87510d1376f4a87<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\">&#8216;FakeUpdates&#8217; campaign leverages multiple website platforms<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 10 Apr 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/' title=''FakeUpdates' campaign leverages multiple website platforms'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/shutterstock_133098560.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Browser update? Do not trust, and do verify before downloading potential malware.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome\/\" rel=\"tag\">chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chtonic\/\" rel=\"tag\">Chtonic<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-updates\/\" rel=\"tag\">fake updates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fakeupdates\/\" rel=\"tag\">FakeUpdates<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/firefox\/\" rel=\"tag\">firefox<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash\/\" rel=\"tag\">flash<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/joomla\/\" rel=\"tag\">Joomla<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/squarespace\/\" rel=\"tag\">Squarespace<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wordpress\/\" rel=\"tag\">wordpress<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/' title=''FakeUpdates' campaign leverages multiple website platforms'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\">&#8216;FakeUpdates&#8217; campaign leverages multiple website platforms<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10699,18058,18059,18060,11122,11739,18061,10531,3764,1810,10510,18062,10494,16341],"class_list":["post-11973","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chrome","tag-chtonic","tag-fake-updates","tag-fakeupdates","tag-firefox","tag-flash","tag-joomla","tag-malvertising","tag-malware","tag-rat","tag-social-engineering","tag-squarespace","tag-threat-analysis","tag-wordpress"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11973"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11973\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11973"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}