{"id":15663,"date":"2019-06-27T09:10:08","date_gmt":"2019-06-27T17:10:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/06\/27\/news-9411\/"},"modified":"2019-06-27T09:10:08","modified_gmt":"2019-06-27T17:10:08","slug":"news-9411","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/27\/news-9411\/","title":{"rendered":"Fake jquery campaign leads to malvertising and ad fraud schemes"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 27 Jun 2019 16:14:35 +0000<\/strong><\/p>\n<p>Recently we became aware of new domains used by an old malware campaign known as &#8216;fake jquery&#8217;, previously <a rel=\"noreferrer noopener\" aria-label=\"documented (opens in a new tab)\" href=\"https:\/\/labs.sucuri.net\/?note=2018-10-30\" target=\"_blank\">documented<\/a> by web security firm Sucuri. Thousands of compromised websites are injected with a reference to an external JavaScript called jquery.js.<\/p>\n<p>However, there is something quite elusive about this campaign with regards to its payload. Indeed, to many researchers the supposedly malicious JavaScript <a rel=\"noreferrer noopener\" aria-label=\"appears to be empty (opens in a new tab)\" href=\"https:\/\/twitter.com\/gwillem\/status\/1035525415497093120\" target=\"_blank\">is always blank.<\/a><\/p>\n<p>In this blog we share how we were able to identify the purpose of the fake jquery malware infection by looking for artifacts and employing a variety of User-Agent strings and geolocations.<\/p>\n<p>Unsurprisingly, we found a web of malicious redirects via malvertising campaigns with a strong focus on mobile users who are tricked into installing rogue apps. The end goal is to monetize via fullscreen adverts that pop up on your phone at regular intervals.<\/p>\n<h3>Looking for a clue<\/h3>\n<p>Our search begins by looking up some of the domains <a rel=\"noreferrer noopener\" aria-label=\"mentioned on Twitter (opens in a new tab)\" href=\"https:\/\/twitter.com\/Placebo52510486\/status\/1141619924512792583\" target=\"_blank\">mentioned on Twitter<\/a> by <a href=\"https:\/\/twitter.com\/Placebo52510486\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">@Placebo52510486<\/a>. There are thousands of sites listed by <a rel=\"noreferrer noopener\" href=\"https:\/\/publicwww.com\/\" target=\"_blank\">PublicWWW<\/a> that have been injected with malicious jquery lookalikes.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39277\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/publicwww_-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_.png\" data-orig-size=\"1035,543\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"publicwww_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_-300x157.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_-600x315.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_.png\" alt=\"\" class=\"wp-image-39277\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_.png 1035w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_-300x157.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_-600x315.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/publicwww_-630x330.png 630w\" sizes=\"(max-width: 1035px) 100vw, 1035px\" \/><\/a><\/figure>\n<\/div>\n<p>While we do not know the exact infection vector,  many of these websites are running an outdated Content Management System (CMS).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39278\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/sucuri_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_.png\" data-orig-size=\"1290,769\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sucuri_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_-300x179.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_-600x358.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_.png\" alt=\"\" class=\"wp-image-39278\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_.png 1290w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_-300x179.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/sucuri_-600x358.png 600w\" sizes=\"(max-width: 1290px) 100vw, 1290px\" \/><\/a><\/figure>\n<\/div>\n<p>Like other researchers before, when we replayed traffic the supposedly malicious JavaScript was once again empty.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39289\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/0content\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content.png\" data-orig-size=\"652,320\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"0content\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content-300x147.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content-600x294.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content.png\" alt=\"\" class=\"wp-image-39289\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content.png 652w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/0content-600x294.png 600w\" sizes=\"(max-width: 652px) 100vw, 652px\" \/><\/a><\/figure>\n<\/div>\n<p>However, with some persistence and luck, we were able to find an <a rel=\"noreferrer noopener\" aria-label=\"archive (opens in a new tab)\" href=\"https:\/\/web.archive.org\/web\/20190604184235\/12js.org\/jquery.js\" target=\"_blank\">archive<\/a> of this script when it was not empty.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39288\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/wayback-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback.png\" data-orig-size=\"701,804\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"wayback\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback-262x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback-523x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback.png\" alt=\"\" class=\"wp-image-39288\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback.png 701w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback-262x300.png 262w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/wayback-523x600.png 523w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/a><\/figure>\n<\/div>\n<p>We can see that it contains a redirect to: financeleader[.]co. A cursory check on this domain confirms the <a rel=\"noreferrer noopener\" aria-label=\"host pairs (opens in a new tab)\" href=\"https:\/\/community.riskiq.com\/search\/financeleader.co\" target=\"_blank\">host pairs<\/a> corresponding to those fake jquery domains. It&#8217;s worth noting that browsing to the root domain without the special identifier will redirect to google.com.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39279\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/riskiq_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_.png\" data-orig-size=\"1278,541\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"riskiq_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_-300x127.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_-600x254.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_.png\" alt=\"\" class=\"wp-image-39279\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_.png 1278w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_-300x127.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/riskiq_-600x254.png 600w\" sizes=\"(max-width: 1278px) 100vw, 1278px\" \/><\/a><\/figure>\n<\/div>\n<h3>Desktop web traffic<\/h3>\n<p>There is some geo-targeting involved for the redirections and clearly desktop users do not appear to be the primary focus here. From a US IP address, you are presented with a bogus site where all items point to the same link that redirect you to instantcheckmate[.]com.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39281\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/page_links_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_.png\" data-orig-size=\"728,736\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"page_links_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_-297x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_-593x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_.png\" alt=\"\" class=\"wp-image-39281\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_.png 728w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_-297x300.png 297w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/page_links_-593x600.png 593w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure>\n<\/div>\n<p>Associated web traffic:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_.png\" data-rel=\"lightbox-6\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39282\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/instantcheckmate_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_.png\" data-orig-size=\"634,189\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"instantcheckmate_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_-300x89.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_-600x179.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_.png\" alt=\"\" class=\"wp-image-39282\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_.png 634w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_-300x89.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_-600x179.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/instantcheckmate_-630x189.png 630w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/a><\/figure>\n<\/div>\n<p>From a non US IP, you are redirected to a page that aggressively advertises VPNs:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__.png\" data-rel=\"lightbox-7\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39283\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/vpns__\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__.png\" data-orig-size=\"800,627\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"vpns__\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__-300x235.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__-600x470.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__.png\" alt=\"\" class=\"wp-image-39283\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__-300x235.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/vpns__-600x470.png 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n<\/div>\n<p>Associated web traffic:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_.png\" data-rel=\"lightbox-8\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39284\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/traffic_vpn_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_.png\" data-orig-size=\"588,167\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_VPN_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_-300x85.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_.png\" alt=\"\" class=\"wp-image-39284\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_.png 588w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/traffic_VPN_-300x85.png 300w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><\/a><\/figure>\n<\/div>\n<h3>Mobile web traffic<\/h3>\n<p>Once we switch to a mobile User-Agent and Android in particular, we can see a lot more activity and a variety of redirects. For example in one case, we were served a bogus adult site that requires users to download an app in order to play the videos:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_.png\" data-rel=\"lightbox-9\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39285\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/_apkvideo_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_.png\" data-orig-size=\"644,565\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"_apkvideo_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_-300x263.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_-600x526.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_.png\" alt=\"\" class=\"wp-image-39285\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_.png 644w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/apkvideo_-600x526.png 600w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/a><\/figure>\n<\/div>\n<p>Associated web traffic:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_.png\" data-rel=\"lightbox-10\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39286\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/app_traffic_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_.png\" data-orig-size=\"639,220\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"app_traffic_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_-300x103.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_-600x207.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_.png\" alt=\"\" class=\"wp-image-39286\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_.png 639w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/app_traffic_-600x207.png 600w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><\/a><\/figure>\n<\/div>\n<p>This app is malicious (detected as Android\/Trojan.HiddenAds.xt by Malwarebytes) and will generate full screen ads at regular intervals.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk.png\" data-rel=\"lightbox-11\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39290\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/ads_apk\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk.png\" data-orig-size=\"455,546\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ads_apk\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk-250x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk.png\" alt=\"\" class=\"wp-image-39290\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk.png 455w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_apk-250x300.png 250w\" sizes=\"(max-width: 455px) 100vw, 455px\" \/><\/a><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1.png\" data-rel=\"lightbox-12\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39287\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/attachment\/ads_-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1.png\" data-orig-size=\"608,609\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ads_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1-300x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1-600x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1.png\" alt=\"\" class=\"wp-image-39287\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1.png 608w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1-300x300.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/ads_-1-600x600.png 600w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/a><\/figure>\n<\/div>\n<h3>Traffic monetization and ad fraud<\/h3>\n<p>While we encountered some desktop traffic, we believe the primary goal of the fake jquery campaign is to monetize from mobile users. This would explain the level of filtering involved to hide non-qualified traffic.<\/p>\n<p>We weren&#8217;t able to get an idea of the scale at play, especially considering that the domain initiating the redirects really only became active in late May. However, given the number of websites that have been compromised, this campaign is quite likely funneling a significant amount of traffic leading to ad fraud.<\/p>\n<p>Malwarebytes users are protected against this campaign both on desktop and mobile.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Fake jquery domains:<\/strong><br \/>12js[.]org<br \/>16js[.]org<br \/>22js[.]org<br \/>lib0[.]org<br \/>16lib[.]org<br \/>12lib[.]org<br \/>wp11[.]org<\/p>\n<p><strong>Redirects:<\/strong><br \/>financeleader[.]co<br \/>afflink[.]org <\/p>\n<p><strong>Malicious APKs:<\/strong><br \/>0e67fd9fc535e0f9cf955444d81b0e84882aa73a317d7c8b79af48d91b79ef19 a210c9960edc5362b23e0a73b92b4ce4597911b00e91e7d3ca82632485c5e68d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/\">Fake jquery campaign leads to malvertising and ad fraud schemes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 27 Jun 2019 16:14:35 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/' title='Fake jquery campaign leads to malvertising and ad fraud schemes'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/shutterstock_1121574374.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We look for answers in a long-running and yet mysterious malware campaign that has compromised thousands of websites to date.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apk\/\" rel=\"tag\">APK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-jquery\/\" rel=\"tag\">fake jquery<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/traffic\/\" rel=\"tag\">traffic<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/' title='Fake jquery campaign leads to malvertising and ad fraud schemes'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes\/\">Fake jquery campaign leads to malvertising and ad fraud schemes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,10462,19418,22119,10531,10494,906],"class_list":["post-15663","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-android","tag-apk","tag-fake-jquery","tag-malvertising","tag-threat-analysis","tag-traffic"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15663"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15663\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15663"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}