{"id":9848,"date":"2017-10-12T15:10:06","date_gmt":"2017-10-12T23:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/12\/news-3621\/"},"modified":"2017-10-12T15:10:06","modified_gmt":"2017-10-12T23:10:06","slug":"news-3621","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/12\/news-3621\/","title":{"rendered":"Equifax, TransUnion websites push fake Flash Player in malvertising campaign"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 12 Oct 2017 21:42:28 +0000<\/strong><\/p>\n<p>Dan Goodin <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> on Ars Technica that the Equifax website was involved in yet another kerfuffle, this time pushing a fake Flash Player. Looking at the <a href=\"https:\/\/www.youtube.com\/watch?time_continue=24&amp;v=XzyDR7f7Wm0\" target=\"_blank\" rel=\"noopener\">YouTube video<\/a> of this incident frame by frame, we were able to retrace some of this malvertising chain.<\/p>\n<pre>aa.econsumer.equifax.com (Equifax)   -&gt; ostats.net    -&gt; webhostingshub.com     -&gt; usa.quebec-lea.com      -&gt; usa.zeroredirect6.com       -&gt; cdn.centerbluray.info (fake Flash)<\/pre>\n<p>For those tracking malvertising, this is a very familiar scenario. However, a question remained as to how we got to the <em>ostats[.]net<\/em> URL. Dan Goodin shared a <a href=\"https:\/\/news.ycombinator.com\/item?id=15456221\" target=\"_blank\" rel=\"noopener\">link<\/a> about a possible culprit, namely a third-party library which would have been loaded from:<\/p>\n<pre>https:\/\/aa.econsumer.equifax.com\/aad\/uib\/js\/fireclick.js<\/pre>\n<p>Since Equifax pulled that site down, it was not possible to identify what that script exactly did. However, a quick search for other websites that were using it returned\u2014surprisingly\u2014another consumer reporting credit agency, namely <a href=\"https:\/\/en.wikipedia.org\/wiki\/TransUnion\" target=\"_blank\" rel=\"noopener\">TransUnion<\/a> and their Central America website.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20040\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png\" alt=\"\" width=\"1217\" height=\"324\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png 1217w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results-300x80.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results-600x160.png 600w\" sizes=\"auto, (max-width: 1217px) 100vw, 1217px\" \/><\/a><\/p>\n<p>By visiting <em>transunioncentroamerica[.]com<\/em>, we were able to confirm that this <em>fireclick.js<\/em> script was indeed part of this redirection chain.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20039\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png\" alt=\"\" width=\"688\" height=\"226\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png 688w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion-300x99.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion-600x197.png 600w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/a><\/p>\n<p>This chain ultimately leads to the fake Flash player.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/transunion.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20050\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/transunion.gif\" alt=\"\" width=\"1121\" height=\"812\" \/><\/a><\/p>\n<p><em>ostats[.]net<\/em> domain is performing all sorts of redirections, as seen in this <a href=\"https:\/\/community.riskiq.com\/\" target=\"_blank\" rel=\"noopener\">RiskIQ&#8217;s PassiveTotal<\/a> search.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20041\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ.png\" alt=\"\" width=\"1058\" height=\"466\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ.png 1058w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-600x264.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-195x85.png 195w\" sizes=\"auto, (max-width: 1058px) 100vw, 1058px\" \/><\/p>\n<p>During our tests we encountered fake surveys, Flash updates, and also a redirection to the RIG exploit kit.<\/p>\n<h3>Third-party script<\/h3>\n<p><a href=\"https:\/\/www.crunchbase.com\/organization\/fireclick\" target=\"_blank\" rel=\"noopener\">Fireclick<\/a> is a legitimate analytics company. If we look at the script closer, we can see that it loads a URL from the Akamai CDN.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20043\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai.png\" alt=\"\" width=\"713\" height=\"376\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai.png 713w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai-300x158.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai-600x316.png 600w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/p>\n<p>In turn, this loads content from another domain <em>snap.sitestats[.]info.<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20044\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png\" alt=\"\" width=\"689\" height=\"338\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png 689w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap-600x294.png 600w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/a><\/p>\n<p>This eventually leads to <em>ostats[.]net.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20045\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats.png\" alt=\"\" width=\"707\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats-300x117.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats-600x234.png 600w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>Some other websites have the script embedded directly into their main page, and they also are involved in this malvertising campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20046\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code.png\" alt=\"\" width=\"676\" height=\"582\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code.png 676w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code-300x258.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code-600x517.png 600w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/p>\n<p>We are still investigating the incident and will report any updates we find on this blog. In the meantime, Malwarebytes users are protected against malicious redirections from this attack.<\/p>\n<h3>Indicators of compromise<\/h3>\n<pre>10\/12\/2017 11:58:32 AM,GET,66.61.173.64,a248.e.akamai[.]net,CDN  10\/12\/2017 11:58:33 AM,POST,209.126.124.246,snap.sitestats[.]info,Stats site  10\/12\/2017 11:58:34 AM,GET,209.126.124.246,snap.sitestats[.]info,Stats site  10\/12\/2017 11:58:35 AM,GET,209.126.122.22,ostats[.]net,Redirector  10\/12\/2017 11:58:35 AM,GET,209.126.127.34,itechnews[.]org,Malvertising  10\/12\/2017 11:58:36 AM,GET,54.172.97.98,usd.quebec-lea[.]com,Malvertising  10\/12\/2017 11:58:36 AM,GET,54.172.97.98,usd.zeroredirect6[.]com,Malvertising  10\/12\/2017 11:58:37 AM,GET,34.194.20.115,www.temocycle[.]site,Malvertising  10\/12\/2017 11:58:37 AM,GET,35.163.98.253,www.theapplicationappmy23[.]download,Fake Flash site  10\/12\/2017 11:58:38 AM,GET,54.230.84.39,www.bestapps4ever161[.]download,Fake Flash site<\/pre>\n<p>Fake Flash player<\/p>\n<pre>24dba15691e81192b76327046f34b2a51b0b460ab058dbb411cf02407ebae57f<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\">Equifax, TransUnion websites push fake Flash Player in malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 12 Oct 2017 21:42:28 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/' title='Equifax, TransUnion websites push fake Flash Player in malvertising campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/code_banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Equifax&#8217;s website is once again infected, this time with malvertising that redirects to a fake Flash player. Further investigation reveals TransUnion was also targeted.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/equifax\/\" rel=\"tag\">Equifax<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash-player\/\" rel=\"tag\">Flash Player<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/transunion\/\" rel=\"tag\">Transunion<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/' title='Equifax, TransUnion websites push fake Flash Player in malvertising campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\">Equifax, TransUnion websites push fake Flash Player in malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12310,11415,10531,3764,10494,15056],"class_list":["post-9848","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-equifax","tag-flash-player","tag-malvertising","tag-malware","tag-threat-analysis","tag-transunion"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9848"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9848\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9848"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}