{"id":6449,"date":"2017-01-31T11:11:05","date_gmt":"2017-01-31T19:11:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/31\/news-286\/"},"modified":"2017-01-31T11:11:05","modified_gmt":"2017-01-31T19:11:05","slug":"news-286","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/31\/news-286\/","title":{"rendered":"A look back at the Zyns iframer campaign"},"content":{"rendered":"<p>We often get asked\u00a0about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior\u00a0to getting infected. This is an interesting aspect when tracking campaigns and what they lead to.<\/p>\n<p>Typically, one can divide the drive-by landscape into two categories: malvertising and compromised websites. The former involves legitimate websites that rely on advertising as their source of revenue. Crooks have long been able to insert themselves into the ad delivery chain in order to push malicious code such that the simple fact of viewing a page with ads actually infects your computer. The latter is made of websites that have been hacked and injected with malicious code and are also used to redirect users to malicious content.<\/p>\n<p>What we refer to as &#8220;campaigns&#8221; are specific attributes from the same threat actor or group similar to what is used to categorize malware families.\u00a0There are many different campaigns for both streams, some come and go while others stick around for long periods of time. For instance, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/10\/exposing-the-flash-eitest-malware-campaign\/\" target=\"_blank\">EItest<\/a>\u00a0is one particular campaign for compromised\u00a0sites which has <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme\" target=\"_blank\">been going on for years<\/a>.<\/p>\n<p>Campaigns are an essential part of the underground\u00a0ecosystem because they continuously feed potential new victims into the infection funnel which ultimately translates into revenues for online criminals.<\/p>\n<p>Today we are\u00a0taking a look at an iframe campaign (<em><strong>Zyns iframer<\/strong><\/em>) that has been going on since at least 2014. There are specific indicators of compromise (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Indicator_of_compromise\" target=\"_blank\">IOCs<\/a>)\u00a0that haven&#8217;t really changed over time and the underlying structure has also remained pretty similar. We have seen this attack chain primarily associated with malvertising, and in particular via adult sites. During its course, we noted\u00a0several different exploit kits being pushed by this campaign (Angler EK, Nuclear Pack, Neutrino EK, RIG EK).<\/p>\n<h3>Patterns (IOCs)<\/h3>\n<p>The redirection infrastructure had very distinct patterns and also shared many of the same server IP addresses over time. We also saw the evolution from dynamic DNS (via sub domains) to domains on dubious top-level domains (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Top-level_domain\" target=\"_blank\">TLDs<\/a>).<\/p>\n<p>URL patterns:<\/p>\n<pre>\/out.php?sid=1  \/out.php?sid=3  \/link.php  \/linkx.php<\/pre>\n<p>Server headers:<\/p>\n<pre>HTTP\/1.1 200 OK  Server: Apache\/2.2.22 (@RELEASE@)  X-Powered-By: PHP\/5.3.3<\/pre>\n<p>Redirection URL:<\/p>\n<pre>&lt;iframe src=\"[EK URL HERE]\" width=\"468\" height=\"60\"   style=\"position:absolute;left:-10000px;\"&gt;&lt;\/iframe&gt;<\/pre>\n<h3>First spotted,\u00a02014<\/h3>\n<p>Our\u00a0earliest records\u00a0are from the fall of\u00a02014 with malvertising attacks mostly affecting Russian users. A capture from later that year shows a drive-by download from <em>blogspot.ru<\/em> via JetSwap, an &#8220;Active Promotion System!&#8221; where\u00a0members and advertisers are linked together via an affiliate program. In this particular case, the advert loads a\u00a0malicious iframe to <em>qera.zyns.com<\/em>\u00a0which performs a 302 redirect to another domain <em>qzertyu.myz.info<\/em>\u00a0and in turn redirects to the Angler exploit kit.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014_overview.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15779\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014_overview.png\" alt=\"2014_overview\" width=\"954\" height=\"628\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014_overview.png 954w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014_overview-300x197.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014_overview-600x395.png 600w\" sizes=\"auto, (max-width: 954px) 100vw, 954px\" \/><\/a><\/p>\n<p>Payload: <a href=\"https:\/\/www.virustotal.com\/en\/file\/7baa48ce1d5b0783fe77a8236301991ebad8cbbfb2726d72ee7baf830be1bfac\/analysis\/1485456355\/\" target=\"_blank\">SmokeLoader<\/a>.<\/p>\n<h3>2014-2015 transition<\/h3>\n<p>The campaign kept going as 2015 rolled in with an almost identical structure. Note the addition of &#8216;link.php&#8217; to the domain in charge of loading iframes to EK. Angler wasn&#8217;t the only exploit kit used by these actors. For example we see Nuclear Pack below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014__2015.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15781\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014__2015.png\" alt=\"2014__2015\" width=\"950\" height=\"387\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014__2015.png 950w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014__2015-300x122.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/2014__2015-600x244.png 600w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/a><\/p>\n<p>Payloads: <a href=\"https:\/\/www.virustotal.com\/en\/file\/40926512103ef629337b9c05c6682ae9fe59ef0cbdce399a50b7e64790cea786\/analysis\/1485456436\/\" target=\"_blank\">Bedep<\/a>\u00a0(<a href=\"https:\/\/www.virustotal.com\/en\/file\/bbf63e84c6d0b842117ea6aa3422df25b0e52517b70fe1b2b2be245d5e4c6064\/analysis\/1485456490\/\" target=\"_blank\">2nd Bedep<\/a>), <a href=\"https:\/\/www.virustotal.com\/en\/file\/fef58646be683c3c2990bfca02e133b8bc9a1339e9fc5e9768a93d737a603858\/analysis\/1485456597\/\" target=\"_blank\">Troldesh.<\/a><\/p>\n<p>Sucuri Labs <a href=\"http:\/\/labs.sucuri.net\/?details=kophon.wha.la\" target=\"_blank\">post<\/a> shows another\u00a0.wha.la domain involved in redirect:<\/p>\n<pre>176.122.88.120<strong>\u00a0<\/strong>kophon.wha.la\/out.php?sid=1<\/pre>\n<p>A piece of code containing the same iframe redirection structure was <a href=\"https:\/\/3v4l.org\/kLVXU\" target=\"_blank\">posted<\/a> in May 2015\u00a0to an online PHP editor. It shows a distinct URL pattern for the RIG exploit kit (RIG EK version 3).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG3_iframe.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16252\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG3_iframe.png\" alt=\"\" width=\"766\" height=\"502\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG3_iframe.png 766w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG3_iframe-300x197.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG3_iframe-600x393.png 600w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/a><\/p>\n<h3>2016<\/h3>\n<p>2016 was an interesting year for exploit kits with the disappearance of Angler EK in June. The capture shown below is one of the latest artifacts we have from Angler EK before it went missing.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/June.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15782\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/June.png\" alt=\"june\" width=\"883\" height=\"492\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/June.png 883w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/June-300x167.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/June-600x334.png 600w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/a><\/p>\n<p>Payload: <a href=\"https:\/\/www.virustotal.com\/en\/file\/22692598cd60b20d1169d173f987bca08ee56ee0f6a33cd22760ebc6b1f1e7ff\/analysis\/1485456663\/\" target=\"_blank\">JuicyLemon<\/a> (ransomware).<\/p>\n<p>As we know,\u00a0criminals transitioned to Neutrino EK after Angler EK went down. During the next few months, up until sometime in September there was a mix of both Neutrino EK and RIG EK used by the actors behind this campaign. Below, Neutrino EK in July:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15792\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/Neutrino.png\" alt=\"neutrino\" width=\"573\" height=\"299\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/Neutrino.png 573w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/Neutrino-300x157.png 300w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/p>\n<p>The campaign was spotted in late June by Malekal (<a href=\"https:\/\/twitter.com\/malekal_morte\/status\/748085372693921796\" target=\"_blank\">link<\/a>) via malvertising on adult sites (with Gootkit mentioned as the payload).<\/p>\n<p>Malware Traffic Analysis wrote a blog entry shortly after (<a href=\"http:\/\/malware-traffic-analysis.net\/2016\/06\/29\/index.html\" target=\"_blank\">link<\/a>):<\/p>\n<pre>93.36.35.39 port 80 - <b>glamgirltube.tk<\/b> - GET \/engine\/classes\/js\/jquery.js - file with injected script  193.36.35.39 port 80 - <b>fijir0.tk<\/b> - GET \/linkx.php - gate  46.30.46.40 port 80 - <b>jy.neutralarbitrations.com<\/b> - RIG EK<\/pre>\n<p>and in July Broad Analysis did too (<a href=\"http:\/\/www.broadanalysis.com\/2016\/07\/05\/neutrino-ek-and-rig-ek-send-gootkit-a-brief-comparison\/\" target=\"_blank\">link<\/a>):<\/p>\n<pre>193.36.35.39 \u2013 <strong>relaxtube.tk<\/strong> \u2013 GET \/engine\/classes\/js\/jquery.js \u2013 <strong>Rig EK REDIRECT<\/strong>  193.36.35.39 \u2013 <strong>waferako.cf<\/strong> \u2013 GET \/linkx.php \u2013 <strong>Rig EK REDIRECT<\/strong>  46.30.46.128 \u2013 <strong>ds.pacificbeachcar.com<\/strong> \u2013 <strong>Rig EK LANDING PAGE<\/strong><\/pre>\n<p>RIG EK (also known as RIG Standard), seen in September:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/RIG_.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15787\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/RIG_.png\" alt=\"rig_\" width=\"801\" height=\"284\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/RIG_.png 801w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/RIG_-300x106.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/RIG_-600x213.png 600w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/a><\/p>\n<p>Payload: <a href=\"https:\/\/www.virustotal.com\/en\/file\/382dcdceaa3278ba9e15cb047cf10f9d4541873fd3332a90cdb1921131e2c6ec\/analysis\/1485456731\/\" target=\"_blank\">Vawtrak<\/a>.<\/p>\n<p>In early December, we noticed a slight change with a new domain used as a redirector. At the same time, there were several instances where two different RIG EKs were pushed from the same redirection chain, leading to two different malware payloads.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2RIGs.png\" target=\"_blank\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16173\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2RIGs.png\" alt=\"\" width=\"665\" height=\"397\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2RIGs.png 665w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2RIGs-300x179.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2RIGs-600x358.png 600w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/a><\/p>\n<p>Payloads: <a href=\"https:\/\/www.virustotal.com\/en\/file\/026b8a9e55aede3b009cd61e9bb8b47827f991789e64d1e1841c8cf39163caeb\/analysis\/1485456818\/\" target=\"_blank\">Gootkit<\/a>, \u00a0<a href=\"https:\/\/www.virustotal.com\/en\/file\/d9b46bf0f43fcbe49645483fc29cf51da67bd583533e7afc9e6aafab87d09e24\/analysis\/1485456866\/\" target=\"_blank\">Moker<\/a>.<\/p>\n<h3>2017<\/h3>\n<p>In January we started seeing the same redirector\u00a0that had been pushing this campaign switch to\u00a0a different chain, this time via compromised sites. This was interesting because throughout December, we were\u00a0seeing the usual sequence of events with the standard iframe, even though this chain came via a different sid (<em>sid 3<\/em>) than the typical <em>sid 1<\/em>.<\/p>\n<p>December 2016 (with <em>sid=3<\/em>)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16174\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG_sid3.png\" alt=\"\" width=\"620\" height=\"439\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG_sid3.png 620w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG_sid3-300x212.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/RIG_sid3-600x425.png 600w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<p>Payload: <a href=\"https:\/\/www.virustotal.com\/en\/file\/76293214c1712a7664f43ffb741c605c041be7c8952b734f5c10b1e2f8834cd9\/analysis\/1485456954\/\" target=\"_blank\">Gootkit<\/a>.<\/p>\n<p>Come January and we have a completely new pattern where an iframe is now inserted via a double chain of events, most notably malicious code injection that looked new to me within a WordPress plugin called Contact Form 7.<\/p>\n<p>January 2017 (also with <em>sid=3<\/em>)<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/new_redir.png\" target=\"_blank\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16176\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/new_redir.png\" alt=\"\" width=\"767\" height=\"649\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/new_redir.png 767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/new_redir-300x254.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/new_redir-600x508.png 600w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" \/><\/a><\/p>\n<p>Payload: <a href=\"https:\/\/www.virustotal.com\/en\/file\/6798a10f94ed257d3b94816c6236122f665310b422be0a5717471d5de840125b\/analysis\/1485457038\/\" target=\"_blank\">Gootkit<\/a>.<\/p>\n<h3>The end of the road?<\/h3>\n<p>In January, several different trails we were tracking began to disappear, showing that the Zyns iframer\u00a0campaign was likely evolving or got merged into something else. The diversity of payloads and exploit kits may indicate there was no particular tie with any\u00a0specific malware distributor.<\/p>\n<p>Threat actors will buy traffic from various sources to push malware, with malvertising often being the top choice for its wide impact. This particular case is a mix of malvertising and bogus adult websites aimed at driving a lot of users into exploit kit landing pages.<\/p>\n<p>To protect yourself against drive-by download attacks, the first thing to do is to\u00a0ensure that your computer is fully up-to-date. Use <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\">Malwarebytes<\/a> to stay\u00a0safe\u00a0from malicious websites and thwart exploits (known and unknown) before they launch their payload.<\/p>\n<p><em>Thanks to <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\">@hasherezade<\/a> for help with payload identification!<\/em><\/p>\n<h3>IOCs<\/h3>\n<p><em>Dec 2014<\/em><\/p>\n<ul>\n<li><em>88.201.248.164<\/em><\/li>\n<li><em>qera.zyns.com\/out.php?sid=1<\/em><\/li>\n<li><em>qzertyu.myz.info\/<\/em><\/li>\n<\/ul>\n<p><em>July 2015<\/em><\/p>\n<ul>\n<li><em>88.201.248.164<\/em><\/li>\n<li><em>ggader.wha.la\/out.php?sid=1<\/em><\/li>\n<li><em>groznore.qpoe.com\/link.php<\/em><\/li>\n<\/ul>\n<p><em>June 2016<\/em><\/p>\n<ul>\n<li><em>193.36.35.39<\/em><\/li>\n<li><em>axas.ga\/out.php?sid=1<\/em><\/li>\n<li><em>fijir0.ga\/linkx.php<\/em><\/li>\n<\/ul>\n<p><em>July 2016<\/em><\/p>\n<ul>\n<li><em>193.36.35.39<\/em><\/li>\n<li><em>mohugerlo.sexxxy.biz\/<\/em><\/li>\n<li><em>waferako.gq\/link.php<\/em><\/li>\n<\/ul>\n<p><em>September 2016<\/em><\/p>\n<ul>\n<li><em>193.36.35.39<\/em><\/li>\n<li><em>agebuho.club\/<\/em><\/li>\n<li><em>korusha.tech\/out.php?sid=1<\/em><\/li>\n<li><em>kopaggyse.ml\/link.php<\/em><\/li>\n<\/ul>\n<p><em>December 2016<\/em><\/p>\n<ul>\n<li><em>193.36.35.129<\/em><\/li>\n<li><em>tohgoo.tech\/<\/em><\/li>\n<li><em>poguhre.ml\/link.php<\/em><\/li>\n<\/ul>\n<p><em>Malware hashes:<\/em><\/p>\n<p><em>7baa48ce1d5b0783fe77a8236301991ebad8cbbfb2726d72ee7baf830be1bfac<\/em><br \/> <em>40926512103ef629337b9c05c6682ae9fe59ef0cbdce399a50b7e64790cea786<\/em><br \/> <em>bbf63e84c6d0b842117ea6aa3422df25b0e52517b70fe1b2b2be245d5e4c6064<\/em><br \/> <em>fef58646be683c3c2990bfca02e133b8bc9a1339e9fc5e9768a93d737a603858<\/em><br \/> <em>22692598cd60b20d1169d173f987bca08ee56ee0f6a33cd22760ebc6b1f1e7ff<\/em><br \/> <em>382dcdceaa3278ba9e15cb047cf10f9d4541873fd3332a90cdb1921131e2c6ec<\/em><br \/> <em>026b8a9e55aede3b009cd61e9bb8b47827f991789e64d1e1841c8cf39163caeb<\/em><br \/> <em>d9b46bf0f43fcbe49645483fc29cf51da67bd583533e7afc9e6aafab87d09e24<\/em><br \/> <em>76293214c1712a7664f43ffb741c605c041be7c8952b734f5c10b1e2f8834cd9<\/em><br \/> <em>6798a10f94ed257d3b94816c6236122f665310b422be0a5717471d5de840125b<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/a-look-back-at-the-zyns-iframer-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/a-look-back-at-the-zyns-iframer-campaign\/' title='A look back at the Zyns iframer campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/04\/photodune-3850671-crime-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Behind compromised sites or malvertising, you will often find trails that can take you back years and see how infection chains evolved, or didn&#8217;t, over time.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/campaign\/\" rel=\"tag\">campaign<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eitest\/\" rel=\"tag\">eitest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iframe\/\" rel=\"tag\">iframe<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zyns-iframer\/\" rel=\"tag\">Zyns iframer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/a-look-back-at-the-zyns-iframer-campaign\/' title='A look back at the Zyns iframer campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11157,11158,10528,10987,11159,10531,3764,3765,10494,11160],"class_list":["post-6449","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-campaign","tag-eitest","tag-exploit-kits","tag-exploits","tag-iframe","tag-malvertising","tag-malware","tag-ransomware","tag-threat-analysis","tag-zyns-iframer"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6449"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6449\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6449"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}