{"id":7060,"date":"2017-03-21T08:10:06","date_gmt":"2017-03-21T16:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/21\/news-851\/"},"modified":"2017-03-21T08:10:06","modified_gmt":"2017-03-21T16:10:06","slug":"news-851","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/21\/news-851\/","title":{"rendered":"Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 Mar 2017 15:48:54 +0000<\/strong><\/p>\n<p>Over\u00a0the last few days we have observed an\u00a0increase in malvertising activity coming from adult websites that have significant traffic (several million monthly visits each).\u00a0Malicious actors are using pop-under ads (adverts that load in a new browser window under the current active page) to surreptitiously redirect users\u00a0to the RIG exploit kit.<\/p>\n<p>This particular campaign abuses the ExoClick ad network (ExoClick was informed and took action to stop the fraudulent advertiser based on our reports) and, according to our telemetry, primarily targets Canada and the U.K.. The ultimate payloads we collected during this time period\u00a0were all the\u00a0Ramnit information stealer (banking, FTP credentials, etc.) which despite\u00a0a <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/botnet-taken-down-through-international-law-enforcement-cooperation\" target=\"_blank\">takedown in 2015<\/a>\u00a0has rebounded and is quite active again.<\/p>\n<h4>Pop-under ads and TDS<\/h4>\n<p>Pop-under ads are usually triggered when a\u00a0user clicks on an item on the site they are browsing. In this particular example, clicking on one of the category thumbnails launches the pop-under window behind\u00a0the main page.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/anti-exploit1.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16880\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/anti-exploit1.png\" alt=\"\" width=\"1159\" height=\"830\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/anti-exploit1.png 1159w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/anti-exploit1-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/anti-exploit1-600x430.png 600w\" sizes=\"auto, (max-width: 1159px) 100vw, 1159px\" \/><em>Figure1: Pop-under advert fires up\u00a0RIG EK (blocked by Malwarebytes)<\/em><br \/> <\/a><\/p>\n<p>The first stage redirection includes a link\u00a0to <strong><em>tds.tuberl.com<\/em><\/strong> within two different JavaScript snippets. This Traffic Distribution System (TDS) mostly loads benign adult portals\/offers\u00a0via ExoClick. The actual malvertising incident takes place next with a 302 redirect to a malicious TDS this time, which performs some geolocation fingerprinting and checks the upper referer before loading the RIG exploit kit.<\/p>\n<h4>Traffic overview:<\/h4>\n<p style=\"text-align: center\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow.png\" data-rel=\"lightbox-1\" title=\"\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16910\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow.png\" alt=\"\" width=\"1144\" height=\"280\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow.png 1144w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow-300x73.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow-600x147.png 600w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><\/em><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx_flow.png\" data-rel=\"lightbox-2\" title=\"\"><em><br \/> <\/em><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-flow.png\" data-rel=\"lightbox-1\" title=\"\"><em>Figure 2: Web traffic showing redirection chain to RIG EK from see.xxx<\/em><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx_flow.png\" data-rel=\"lightbox-2\" title=\"\"><br \/> <\/a><\/p>\n<p>&nbsp;<\/p>\n<h4>Redirection chain:<\/h4>\n<p style=\"text-align: center\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-diagramflow.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16911\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-diagramflow.png\" alt=\"\" width=\"544\" height=\"1892\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-diagramflow.png 660w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-diagramflow-86x300.png 86w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx_diagramflow.png\" data-rel=\"lightbox-6\" title=\"\"><br \/> <\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/seexxx-diagramflow.png\" data-rel=\"lightbox-5\" title=\"\"><em>Figure 3: TDS redirection based on the user&#8217;s geolocation<\/em><\/a><\/p>\n<p>We noted the same attack pattern with several other adult portals using the malicious TDS mentioned above to load RIG EK:<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic.png\" data-rel=\"lightbox-8\" title=\"\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16912\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic.png\" alt=\"\" width=\"1143\" height=\"246\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic.png 1143w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic-300x65.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic-600x129.png 600w\" sizes=\"auto, (max-width: 1143px) 100vw, 1143px\" \/><br \/> <\/em><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno-traffic.png\" data-rel=\"lightbox-8\" title=\"\"><em>Figure 4:\u00a0Web traffic showing redirection chain to RIG EK from justporno.tv<\/em><\/a><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/justporno_traffic.png\" data-rel=\"lightbox-10\" title=\"\"><br \/> <\/a><\/p>\n<h4>Ramnit going after Canada and the U.K.<\/h4>\n<p>The payloads we collected via our honeypot were all the Ramnit Trojan, which is interesting considering the traffic flow from\u00a0the TDS (Canada, U.K. being the most hits recorded in our telemetry). A\u00a0<a href=\"https:\/\/securityintelligence.com\/the-return-of-ramnit-life-after-a-law-enforcement-takedown\/\" target=\"_blank\">report<\/a> from IBM security researcher\u00a0Limor Kessem in December\u00a02015 indicated that Canada was the top target with 55% of all Ramnit activity. A follow up <a href=\"https:\/\/securityintelligence.com\/ramnit-rears-its-ugly-head-again-targets-major-uk-banks\/\" target=\"_blank\">report<\/a> from the same researcher in August 2016 showed a new wave of attacks directed this time at the U.K.<\/p>\n<p>We informed ExoClick and they have been able to locate and terminate the rogue advertiser. Malwarebytes users were already\u00a0protected against this distribution campaign and the Ramnit Trojan.<\/p>\n<h4>IOCs<\/h4>\n<p>Malware hashes:<\/p>\n<pre>53ba545c599a66a148e590b11e9cdc0d49141b03d9f870fcd52593f39bcd690d  845824afa87c0eccf25b09cbf57fbe2ab9e356b6cdbac220271e9c4e732bb174  3feb4c5198cd00361dc5631334288f9ba6a25b3d35028b0cd10f453525ff1c9e  c72e3c5120e948599a2f6f215a7ef53f71763ce16303782872bab9cf5599610a  be3705cf0964cebe7084439f502ae4d40fc063693be44fbe54fe7a9f8ae180df  228af3aa07a2c37badf83cdd552710434601d8f3abf60df8d8264cdf3f694d70  <\/pre>\n<p>RIG EK domains:<\/p>\n<pre>set.designervintagejewelry.com  cxz.suttonsite.com  rew.lafontant.services  new.serviceslafontant.ca  act.opencomputinginstitute.com  free.learntoridemotorcycle.com  rew.dietingplan.org  gfd.dealsboy.in  admin.sellsettlement.org  act.loseyourweightnaturally.com  acc.buycellulitetreatments.com  art.joecornellweddings.com  see.chairblue.com  list.werledlighting.com  never.alexagift.com  see.aliharperweddings.com  see.clicklinkto.info  free.nutrangnu.com  all.woodfurnituregarden.com  top.villabluesteps.com  act.obamapower.com  new.4u-insurance.com  art.carondeletevents.com  add.cmlib.org  far.clickbankidol.com  rew.terrigenesis.com  line.bermudaweddings.net  rec.goldenknightsfan.com  try.sjtri.com  add.lvgoldenknightsfan.com  free.cmlib.info  act.twoocomms.com  <\/pre>\n<p>RIG EK IPs:<\/p>\n<pre>188.225.38.209  188.225.38.186  188.225.38.164  188.225.38.131  5.200.52.240<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/exploits-threat-analysis\/2017\/03\/canada-u-k-hit-ramnit-trojan-new-malvertising-campaign\/\">Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/exploits-threat-analysis\/2017\/03\/canada-u-k-hit-ramnit-trojan-new-malvertising-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 Mar 2017 15:48:54 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/exploits-threat-analysis\/2017\/03\/canada-u-k-hit-ramnit-trojan-new-malvertising-campaign\/' title='Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/voyeur.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>This new malvertising campaign on adult websites was pushing the Ramnit information stealer.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exoclick\/\" rel=\"tag\">exoclick<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ramnit\/\" rel=\"tag\">ramnit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rigek\/\" rel=\"tag\">RIGEK<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/exploits-threat-analysis\/2017\/03\/canada-u-k-hit-ramnit-trojan-new-malvertising-campaign\/' title='Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/exploits-threat-analysis\/2017\/03\/canada-u-k-hit-ramnit-trojan-new-malvertising-campaign\/\">Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11690,10987,10531,11691,11589,11692],"class_list":["post-7060","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exoclick","tag-exploits","tag-malvertising","tag-ramnit","tag-rig","tag-rigek"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7060"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7060\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7060"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}