{"id":23488,"date":"2023-11-30T08:10:07","date_gmt":"2023-11-30T16:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/30\/news-17218\/"},"modified":"2023-11-30T08:10:07","modified_gmt":"2023-11-30T16:10:07","slug":"news-17218","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/30\/news-17218\/","title":{"rendered":"Associated Press, ESPN, CBS among top sites serving fake virus alerts"},"content":{"rendered":"\n<p>ScamClub is a threat actor who&#8217;s been involved in malvertising activities <a href=\"https:\/\/blog.confiant.com\/malvertising-attack-hijacks-300-million-sessions-over-48-hours-9d0218fe02cd\">since 2018<\/a>. Chances are you probably ran into one of their online scams on your mobile device.<\/p>\n<p>Confiant, the firm that has tracked ScamClub for years, released a comprehensive <a href=\"https:\/\/www.confiant.com\/news\/scamclub-threat-intelligence-report-q1-q2-2023\">report<\/a> in September while also <a href=\"https:\/\/x.com\/WeAreConfiant\/status\/1712143807330853199?s=20\">disrupting their activities<\/a>. However, ScamClub has been back for several weeks, and more recently they were behind some very high profile malicious redirects.<\/p>\n<p>The list of affected publishers includes the Associated Press, ESPN and CBS, where unsuspecting readers are automatically redirected to a fake security alert connected to a malicious McAfee affiliate.<\/p>\n<p>ScamClub is resourceful and continues to have a deep impact on the ad ecosystem. While we could not identify precisely which entity served the ad, we have reported the website used to run the fake scanner to Cloudflare which immediately took action and flagged it as phishing.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-forced-redirects\">Forced redirects<\/h3>\n<p>Mastodon user Blair Strater (<a href=\"https:\/\/fosstodon.org\/@r000t\/111437486088259641\">@r000t@fosstodon.org<\/a>) was simply browsing the Associated Press website on his phone when he was suddenly redirected to a fake security scan page:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"450\" height=\"1000\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/video-5.gif\" alt=\"\" class=\"wp-image-99072\" \/><figcaption class=\"wp-element-caption\">Malicious redirect from APnews.com (credit Blair Strater)<\/figcaption><\/figure>\n<p>This fake scanner is not run by McAfee, but the domain name <em>systemmeasures[.]life<\/em> that we see in the address bar is the landing page that redirects to one of its affiliates. That affiliate was previously reported but <a href=\"https:\/\/x.com\/JimBrowning11\/status\/1707048138182099179?s=20\">continues unabated<\/a>.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"666\" height=\"205\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/traffic-2.png\" alt=\"\" class=\"wp-image-99086\" \/><figcaption class=\"wp-element-caption\">Web traffic between malicious page and McAfee site<\/figcaption><\/figure>\n<p>Based on public data, several ad exchanges were abused to deliver this fake antivirus campaign via real-time bidding (RTB) in the past few weeks Most of the telemetry we saw from our Malwarebytes user base was related to smaller websites with &#8216;risky&#8217; advertisers. However, a different campaign was targeting mobile users with malicious ads slipping by on top publishers (note: this data comes from <a href=\"https:\/\/www.virustotal.com\/gui\/domain\/systemmeasures.life\/relations\">VirusTotal<\/a>):<\/p>\n<p><strong>ESPN.COM (1.585B monthly visits)<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">systemmeasures[.]life\/avs\/en\/mob\/<strong>mcafee-2<\/strong>.php?c=5uz3hbaiz7oz2&amp;k=b47648817b492be8ba9c7dc97addefb6&amp;country_code=US&amp;carrier=Verizon&amp;country_name=United%20States&amp;region=New%20York&amp;city=Bronx&amp;isp=MCI%20Communications%20Services,%20Inc.%20d\/b\/a%20Verizon%20Business&amp;lang=en&amp;ref_domain=<strong>www.espn.com<\/strong>&amp;os=<strong>iOS<\/strong>&amp;osv=17&amp;browser=Chrome&amp;browserv=119&amp;brand=Apple&amp;model=iPhone&amp;marketing_name=iPhone&amp;tablet=2&amp;rheight=0&amp;rwidth=0&amp;e=5<\/pre>\n<p><strong>APNEWS.COM (307.2M monthly visits)<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">systemmeasures[.]life\/avs\/en\/mob\/<strong>mcafee-2<\/strong>.php?c=59z40b4g6z7oz2&amp;k=506222e0611d62c3261b9ba847063faa&amp;country_code=US&amp;carrier=-&amp;country_name=United%20States&amp;region=Virginia&amp;city=Alexandria&amp;isp=Comcast%20Cable%20Communications,%20LLC&amp;lang=en&amp;ref_domain=<strong>apnews.com<\/strong>&amp;os=<strong>Android<\/strong>&amp;osv=10.&amp;browser=Chrome&amp;browserv=119&amp;brand=unknown&amp;model=unknown&amp;marketing_name=K&amp;tablet=2&amp;rheight=0&amp;rwidth=0&amp;e=5<\/pre>\n<p><strong>CBSSPORTS.COM (265.1M monthly visits)<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">systemmeasures[.]life\/avs\/en\/mob\/<strong>mcafee-2<\/strong>.php?c=5uz16jptz7oz2&amp;k=d2761f12fed2ce8472ab704fd55d49e1&amp;country_code=US&amp;carrier=-&amp;country_name=United%20States&amp;region=Colorado&amp;city=Greenwood%20Village&amp;isp=Charter%20Communications%20Inc&amp;lang=en&amp;ref_domain=<strong>www.cbssports.com<\/strong>&amp;os=<strong>Android<\/strong>&amp;osv=10.&amp;browser=Chrome&amp;browserv=119&amp;brand=unknown&amp;model=unknown&amp;marketing_name=K&amp;tablet=2&amp;rheight=0&amp;rwidth=0&amp;e=5<\/pre>\n<p>Most of the public reports ([<a href=\"https:\/\/support.google.com\/chrome\/thread\/244678044\/browser-keeps-getting-hijacked-and-redirected-to-scam-mcafee-site?hl=en\">1<\/a>], [<a href=\"https:\/\/www.reddit.com\/r\/mac\/comments\/17za8a9\/espn_redirecting_to_systemmeasureslife_on_chrome\/\">2<\/a>], [<a href=\"https:\/\/www.reddit.com\/r\/ESPN\/comments\/17zfu97\/urgent_espn_website_compromised_by_malware\/\">3<\/a>]) indicate this campaign was at its peak around <strong>November 19<\/strong>. To be clear, AP, ESPN, CBS and other sites were not hacked, but rather showed malicious ads. It appears that this high profile campaign stopped shortly after, as we haven&#8217;t seen new telemetry data coming from these publishers. However, the other campaign we are also monitoring that is affecting smaller sites is still ongoing (via <em>eu[.]vulnerabilityassessments.life<\/em> and <em>us.vulnerabilityassessments[.]life<\/em>).<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-connection-with-scamclub\">Connection with ScamClub<\/h3>\n<p>We were able to connect this campaign to the ScamClub infrastructure because of another domain (<em>trackmaster[.]cc<\/em>) that was previously <a href=\"https:\/\/blog.confiant.com\/scamclubs-deceptive-landing-pages-bf7989b388d2\">mentioned<\/a> as belonging to the threat actor. We can see the relationship between <em>systemmeasures[.]life<\/em> (the landing page) and <em>trackmaster[.]cc<\/em> (the intermediary domain) in the urlscanio <a href=\"https:\/\/urlscan.io\/result\/268b5c29-f02c-4a60-a67a-93f598e83879\/#transactions\">submission<\/a> below:<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"892\" height=\"597\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/urlscan-1.png\" alt=\"\" class=\"wp-image-99066\" style=\"aspect-ratio:1.4941373534338358;width:744px;height:auto\" \/><figcaption class=\"wp-element-caption\">urlscanio scan showing the relationship between two domains<\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-fingerprinting\">Fingerprinting<\/h3>\n<p>Like other malvertising threat actors, ScamClub dabbles in obfuscation and evasion techniques. However, as previously detailed by Confiant, they are using much more advanced tricks. Their JavaScript uses <a href=\"https:\/\/blog.confiant.com\/exploring-scamclub-payloads-via-deobfuscation-using-abstract-syntax-trees-65ef7f412537\">obfuscation<\/a> with changing variable names, making identification harder.<\/p>\n<p>Previously, the malicious JavaScripts were hosted on Google&#8217;s cloud but they have now moved to Azure&#8217;s CDN.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"691\" height=\"633\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/scamclubjs.png\" alt=\"\" class=\"wp-image-99357\" \/><figcaption class=\"wp-element-caption\">ScamClub&#8217;s malicious JavaScript<\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-malvertising-and-mobile-users\">Malvertising and mobile users<\/h3>\n<p>On this blog, we have covered a number of malvertising campaigns targeting Desktop, both <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/malvertising-its-a-jungle-out-there\">consumer<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\">enterprise<\/a>. This is in part because we hunt for Windows malware and the occasional Mac ones too.<\/p>\n<p>ScamClub is a good example of targeting a big market segment, Mobile Web, where security software is often an afterthought, in particular on iOS, in part due to restrictions imposed by Apple. Clearly, malvertising is flourishing on Mobile and users are just as likely, if not more, to get tricked into downloading malware or get scammed.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> protects users from this campaign:<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"360\" height=\"580\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Android-1.png?w=360\" alt=\"\" class=\"wp-image-99361\" \/><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h3>\n<p><strong>ScamClub URLs<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">octob[.]azureedge[.]net\/oc.js lzi[.]azureedge[.]net\/lz.js tinlc[.]azureedge[.]net\/pt.js bm-rb[.]azureedge.net\/rb.js foluo[.]azureedge[.]net\/fo.js vpv-ger[.]azureedge[.]net\/VpaidVideoAd1.js<\/pre>\n<p><strong>ScamClub JavaScript hashes<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">c01716e23f633b206147efbe70fb37945e3857d6575fd088ea50106fb541cf1e<br>899cbfbd676159201b2281d9e0e66f3ac200ac58b674375bde04083ff87650ad<br>451b48c8f247f25cd09a1bf4a52fc195a74830d88bd2ffed7a5d4b7830e10621<br>495304b489cecd33188ca2a7407d397996fd82ea99966e7c145f0dc67ab2dfb5<br>a616fc2c1a075170d4decdb9d3c9ad15f2cfbcfda78dbe4c60d72132b9d006c9<br>34f15ec739df72f5ac245db3fff11ea56407e95b94e24bbb820d7999032866d8<br>a7a73d3bc716346808b2ee8070dfe5842bb01e10aee1fa9ba87fb975d71d0f4f<br>de2f1745cdfbe58266b804961bdbd5be8f533843ed7fdf4b5fe6eb0060876b56<br>1614786dd6ff4189975e8226ab7e68d258817b435c3c4e145951f5147699878e<br>52cd9f2ff282354c77087b204d5cb32cee9066e8eea4e3c3b8f7cf4d3d3fa20f<br>df03df284bfbbe006383f26c0c91394f4c4c8d915d04b868a00954f63e6163e0<br>2f3867d33c448b941278671df9a2b8d3d6b29dec5d74b67654f5edfcc6771575<br>243d9d70703644f3df148e7633f3ec461a9c43149ea58fd547e2e6fd0c47cce5<\/pre>\n<p><strong>Redirectors<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">trackmaster[.]cc<br>protectsystemtools[.]life<br>securitypatch[.]life<br>real-time-system-monitoring[.]life<br>threatdetectorhub[.]life<br>threatdetectorhub[.]online<br>vulnerabilityassessments[.]life<br>strike-it-lucky[.]space<br>golden-opportunity[.]xyz<br>stroke-of-luck[.]xyz<br>blessed-with-luck[.]space<br>system-scan-tool[.]space<br>system-security-scan[.]buzz<br>system-security-scan[.]net<br>system-scan-tool[.]online<br>trk6[.]kokamedia[.]com<br>tracklinker[.]space<br>trackmenow[.]life<br>trackify[.]world<br>trackinghub[.]info<br>trkmyclk[.]xyz<br>trk-server[.]xyz<\/pre>\n<pre class=\"wp-block-preformatted\">34.74.68[.]195<\/pre>\n<p><strong>Scam landing pages<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">systemmeasures[.]life xyzcreators[.]xyz<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/11\/associated-press-espn-cbs-among-top-sites-serving-fake-virus-alerts\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A fake antivirus alert may suddenly hijack your screen while browsing. This latest malvertising campaign hit top publishers. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10531,11522,12040],"class_list":["post-23488","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-malvertising","tag-mcafee","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23488"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23488\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23488"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}