{"id":9869,"date":"2017-10-13T09:10:04","date_gmt":"2017-10-13T17:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/13\/news-3642\/"},"modified":"2017-10-13T09:10:04","modified_gmt":"2017-10-13T17:10:04","slug":"news-3642","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/13\/news-3642\/","title":{"rendered":"Malvertising on Equifax, TransUnion tied to third party script (updated)"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 12 Oct 2017 21:42:28 +0000<\/strong><\/p>\n<p><strong>Update (09-13-2017)<\/strong>: Ars is <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-rival-transunion-also-sends-site-visitors-to-malicious-pages\/\" target=\"_blank\" rel=\"noopener\">reporting<\/a> that TransUnion identified and mitigated the issue as per the following statement:<\/p>\n<p><em>&#8220;TransUnion is aware that our Central America website was temporarily redirecting users to download malicious software. The issue has been fixed and we are scanning our other websites. TransUnion has not identified any unauthorized access to its systems as a result of this issue.&#8221;<\/em><\/p>\n<p>&#8211; &#8211;<br \/> Dan Goodin <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> on Ars Technica that the Equifax website was involved in yet another kerfuffle, this time pushing a fake Flash Player. Looking at the <a href=\"https:\/\/www.youtube.com\/watch?time_continue=24&amp;v=XzyDR7f7Wm0\" target=\"_blank\" rel=\"noopener\">YouTube video<\/a>\u00a0(captured by security researcher\u00a0<a href=\"http:\/\/randy-abrams.blogspot.ca\/2017\/10\/new-equifax-website-compromise.html\" target=\"_blank\" rel=\"noopener\">Randy Abrams<\/a>)\u00a0frame by frame, we were able to retrace some of this malvertising chain.<\/p>\n<pre>aa.econsumer.equifax.com (Equifax)   -&gt; ostats.net    -&gt; webhostingshub.com     -&gt; usa.quebec-lea.com      -&gt; usa.zeroredirect6.com       -&gt; cdn.centerbluray.info (fake Flash)<\/pre>\n<p>For those tracking malvertising, this is a very familiar sequence. However, a question remained as to how we got to the <em>ostats[.]net<\/em> URL. Dan Goodin shared a <a href=\"https:\/\/news.ycombinator.com\/item?id=15456221\" target=\"_blank\" rel=\"noopener\">link<\/a> about a possible culprit, namely a third-party library which would have been loaded from:<\/p>\n<pre>https:\/\/aa.econsumer.equifax.com\/aad\/uib\/js\/<strong>fireclick.js<\/strong><\/pre>\n<p>Since Equifax pulled that site down, it was not possible to identify what that script exactly did. However, a quick search for other websites that were using it returned\u2014surprisingly\u2014another consumer reporting credit agency, namely <a href=\"https:\/\/en.wikipedia.org\/wiki\/TransUnion\" target=\"_blank\" rel=\"noopener\">TransUnion<\/a> and their Central America website.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20040\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png\" alt=\"\" width=\"1217\" height=\"324\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results.png 1217w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results-300x80.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/results-600x160.png 600w\" sizes=\"auto, (max-width: 1217px) 100vw, 1217px\" \/><\/a><\/p>\n<p>By visiting <em>transunioncentroamerica[.]com<\/em>, we were able to confirm that this <em>fireclick.js<\/em> script was indeed part of this redirection chain.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20039\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png\" alt=\"\" width=\"688\" height=\"226\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion.png 688w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion-300x99.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/traffic_transunion-600x197.png 600w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/a><\/p>\n<p>This chain ultimately leads to the fake Flash player.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/transunion.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20050\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/transunion.gif\" alt=\"\" width=\"1121\" height=\"812\" \/><\/a><\/p>\n<p><em>ostats[.]net<\/em> domain is performing all sorts of redirections, as seen in this <a href=\"https:\/\/community.riskiq.com\/\" target=\"_blank\" rel=\"noopener\">RiskIQ&#8217;s PassiveTotal<\/a> search.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20041\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ.png\" alt=\"\" width=\"1058\" height=\"466\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ.png 1058w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-600x264.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/riskIQ-195x85.png 195w\" sizes=\"auto, (max-width: 1058px) 100vw, 1058px\" \/><\/p>\n<p>During our tests we encountered fake surveys, Flash updates, and also a redirection to the RIG exploit kit.<\/p>\n<h3>Third-party script<\/h3>\n<p><a href=\"https:\/\/www.crunchbase.com\/organization\/fireclick\" target=\"_blank\" rel=\"noopener\">Fireclick<\/a> is a legitimate analytics company. If we look at the script closer, we can see that it loads a URL from the Akamai CDN.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20043\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai.png\" alt=\"\" width=\"713\" height=\"376\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai.png 713w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai-300x158.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/akamai-600x316.png 600w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/p>\n<p>In turn, this loads content from another domain <em>snap.sitestats[.]info.<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20044\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png\" alt=\"\" width=\"689\" height=\"338\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap.png 689w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/snap-600x294.png 600w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/a><\/p>\n<p>This eventually leads to <em>ostats[.]net.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20045\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats.png\" alt=\"\" width=\"707\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats-300x117.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/ostats-600x234.png 600w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>Some other websites have the script embedded directly into their main page, and they also are involved in this malvertising campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20046\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code.png\" alt=\"\" width=\"676\" height=\"582\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code.png 676w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code-300x258.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/fireclick_code-600x517.png 600w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/p>\n<p>We are still investigating the incident and will report any updates we find on this blog. In the meantime, Malwarebytes users are protected against malicious redirections from this attack.<\/p>\n<h3>Indicators of compromise<\/h3>\n<pre>10\/12\/2017 11:58:32 AM,GET,66.61.173.64,a248.e.akamai[.]net,CDN  10\/12\/2017 11:58:33 AM,POST,209.126.124.246,snap.sitestats[.]info,Stats site  10\/12\/2017 11:58:34 AM,GET,209.126.124.246,snap.sitestats[.]info,Stats site  10\/12\/2017 11:58:35 AM,GET,209.126.122.22,ostats[.]net,Redirector  10\/12\/2017 11:58:35 AM,GET,209.126.127.34,itechnews[.]org,Malvertising  10\/12\/2017 11:58:36 AM,GET,54.172.97.98,usd.quebec-lea[.]com,Malvertising  10\/12\/2017 11:58:36 AM,GET,54.172.97.98,usd.zeroredirect6[.]com,Malvertising  10\/12\/2017 11:58:37 AM,GET,34.194.20.115,www.temocycle[.]site,Malvertising  10\/12\/2017 11:58:37 AM,GET,35.163.98.253,www.theapplicationappmy23[.]download,Fake Flash site  10\/12\/2017 11:58:38 AM,GET,54.230.84.39,www.bestapps4ever161[.]download,Fake Flash site<\/pre>\n<p>Fake Flash player<\/p>\n<pre>24dba15691e81192b76327046f34b2a51b0b460ab058dbb411cf02407ebae57f<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\">Malvertising on Equifax, TransUnion tied to third party script (updated)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 12 Oct 2017 21:42:28 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/' title='Malvertising on Equifax, TransUnion tied to third party script (updated)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/code_banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at the the recent malvertising incident that happened on Equifax&#8217;s site and show how it also affected TransUnion.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/equifax\/\" rel=\"tag\">Equifax<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash-player\/\" rel=\"tag\">Flash Player<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/transunion\/\" rel=\"tag\">Transunion<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/' title='Malvertising on Equifax, TransUnion tied to third party script (updated)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/equifax-transunion-websites-push-fake-flash-player\/\">Malvertising on Equifax, TransUnion tied to third party script (updated)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12310,11415,10531,3764,10494,15056],"class_list":["post-9869","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-equifax","tag-flash-player","tag-malvertising","tag-malware","tag-threat-analysis","tag-transunion"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9869"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9869\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9869"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}