{"id":12298,"date":"2018-05-15T11:10:04","date_gmt":"2018-05-15T19:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/15\/news-6067\/"},"modified":"2018-05-15T11:10:04","modified_gmt":"2018-05-15T19:10:04","slug":"news-6067","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/05\/15\/news-6067\/","title":{"rendered":"Tech support scam uses fake Shoppers Stop site to lure thousands"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 08 May 2018 13:25:00 +0000<\/strong><\/p>\n<p>These days, there are a lot of browser locker campaigns fueled by malvertising or redirection from hacked sites. But the Shoppers Stop tech scam campaign is actually a bit of both, using compromised sites injected with advertising code that redirects users to other threats,\u00a0including tech support scams, via malvertising.<\/p>\n<p>We believe those ad injections came from pirated CMS themes. Normally, these are WordPress themes that people typically have to pay to download. Instead, they are offered for free, with a bonus bundle of malicious code.<\/p>\n<p>One aspect we noticed as part of the redirection mechanism was an online shopping portal registered to domains with suspicious TLDs such as\u00a0<em>.trade<\/em>, <em>.accountant<\/em>, <em>.ml<\/em>\u00a0that quickly rotate to make blacklisting approaches futile. However, using that same artifact, we were able to flag other browser locker incidents for this particular campaign.<\/p>\n<h3>The browlock<\/h3>\n<p>The browser locker used in this campaign is a spin-off of the Google Chrome Safebrowing warning. The scammers have added scare tactics to it (e.g.\u00a0<em>Hard Drive Safety Delete Starting in: 5:00 minutes<\/em>), as well as authentication pop-ups that prevent the user from closing the browser tab or window.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23549\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/browlock_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_.png\" data-orig-size=\"1072,806\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browlock_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_-300x226.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_-600x451.png\" class=\"size-full wp-image-23549 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_.png\" alt=\"\" width=\"1072\" height=\"806\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_.png 1072w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_-300x226.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_-600x451.png 600w\" sizes=\"auto, (max-width: 1072px) 100vw, 1072px\" \/><\/a><\/p>\n<p>In this template, the crooks have not bothered with changing the IP address (supposedly of their victim), which still belongs to the original creator of that page, located somewhere in India. The toll-free number, dynamically populated both on the page and the URL, is what the scammers hope potential victims will dial.<\/p>\n<h3>Traffic<\/h3>\n<p>As mentioned earlier, the number one vector of traffic to these browser locker pages is advertising\u2014more precisely, malvertising. Perpetrators can spend a small budget and attract a fair amount of visits through one of many ad networks. More and more, we are seeing ad platforms ensure that visitors are legitimate and not bots or others using anonymous proxies.<\/p>\n<p>In some cases, this &#8216;lead funneling&#8217; is doubled by the use of a traffic distribution system (TDS). Here&#8217;s an example we captured via the well-documented <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/drive-service-blacktds\" target=\"_blank\" rel=\"noopener\">BlackTDS<\/a>, redirecting users to ad networks and eventually to the browlock.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23551\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/traffic1_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_.png\" data-orig-size=\"732,307\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic1_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_-300x126.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_-600x252.png\" class=\"size-full wp-image-23551 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_.png\" alt=\"\" width=\"732\" height=\"307\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_.png 732w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_-300x126.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic1_-600x252.png 600w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/a><\/p>\n<p>BlackTDS has been the source of many browser lockers that have been caught by other researchers as well. For example, on March 29,\u00a0<a href=\"https:\/\/twitter.com\/VK_Intel\/status\/979379637070446594\" target=\"_blank\" rel=\"noopener\">Vitali Kremez reported<\/a> an infection chain to a browlock started via\u00a0<em>smarttraffics[.]ml<\/em>.<\/p>\n<p>Another instance of the same threat was found as part of an ongoing campaign of compromised websites injected with ad network code. There have been reports from site owners since late last year, but the trend has increased recently.<\/p>\n<p><a href=\"https:\/\/twitter.com\/unmaskparasites\" target=\"_blank\" rel=\"noopener\">Denis Sinegubko<\/a> from <a href=\"https:\/\/sucuri.net\/\" target=\"_blank\" rel=\"noopener\">Sucuri<\/a> <a href=\"https:\/\/twitter.com\/unmaskparasites\/status\/990305069986910210\" target=\"_blank\" rel=\"noopener\">noted<\/a> that an ad script with the same ID was injected into over 2,000 websites and drew the conclusion that this was not a case of webmasters using ads for monetization, but rather unwanted ad injections into their CMS. Using the\u00a0Source Code Search Engine <a href=\"https:\/\/publicwww.com\" target=\"_blank\" rel=\"noopener\">PublicWWW<\/a>, we found thousands of websites with the same ad codes:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23599\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/publicwww_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_.png\" data-orig-size=\"1213,624\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"publicwww_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_-300x154.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_-600x309.png\" class=\"size-full wp-image-23599 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_.png\" alt=\"\" width=\"1213\" height=\"624\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_.png 1213w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_-300x154.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/publicwww_-600x309.png 600w\" sizes=\"auto, (max-width: 1213px) 100vw, 1213px\" \/><\/a><\/p>\n<p>For several weeks now, we have reproduced numerous infection chains to exploit kits, browlocks, and other scams via those injected ads.<\/p>\n<pre>\/\/go.oclaserver[.]com\/apu.php?zoneid=removed  \/\/go.mobtrks[.]com\/notice.php?p=removed&amp;interstitial=1  \/\/go.mobisla[.]com\/notice.php?p=removed&amp;interactive=1&amp;pushup=1  \/\/defpush[.]com\/ntfc.php?p=removed<\/pre>\n<p>The server side PHP code (<a href=\"http:\/\/labs.sucuri.net\/?note=2017-11-13\" target=\"_blank\" rel=\"noopener\">WP-VCD malware<\/a>) used to load those ads can be seen below. Thanks to our friends at Sucuri for sharing it.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23639\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/php__\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__.png\" data-orig-size=\"778,2143\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PHP__\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__-109x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__-218x600.png\" class=\"size-full wp-image-23639 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__.png\" alt=\"\" width=\"778\" height=\"2143\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__.png 778w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__-109x300.png 109w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/PHP__-218x600.png 218w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/a><\/p>\n<p>Sucuri&#8217;s <a href=\"https:\/\/sitecheck.sucuri.net\/\" target=\"_blank\" rel=\"noopener\">SiteCheck<\/a> detects these server-side injections as <a href=\"http:\/\/labs.sucuri.net\/db\/malware\/rogueads.unwanted_ads?1\" target=\"_blank\" rel=\"noopener\">rogueads.unwanted_ads<\/a>. The leading cause for these injections are Nulled themes, pirated copies of paid-for CMS themes. The free lunch often comes with backdoors, lack of future updates, and of course violating licensing and copyright laws.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23600\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/unwanted_ads_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_.png\" data-orig-size=\"1364,670\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"unwanted_ads_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_-300x147.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_-600x295.png\" class=\"size-full wp-image-23600 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_.png\" alt=\"\" width=\"1364\" height=\"670\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_.png 1364w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/unwanted_ads_-600x295.png 600w\" sizes=\"auto, (max-width: 1364px) 100vw, 1364px\" \/><\/a><\/p>\n<p>In the following traffic capture (thanks <a href=\"https:\/\/twitter.com\/baberpervez2\" target=\"_blank\" rel=\"noopener\">Baber Pervez<\/a>), we notice the ad injection leading to a malicious redirection chain via the following sequence:<\/p>\n<ul>\n<li><em>dreams-al[.]com<\/em> (Compromised site)\n<ul>\n<li><em>oclasrv[.]com<\/em> (PropellerAds ad network)\n<ul>\n<li><em>deloton[.]com<\/em> (PropellerAds ad network)\n<ul>\n<li><em>xml.adhunter[.]media<\/em> (XML feed)\n<ul>\n<li><em>updating23001.accountant<\/em> (Shoppers Stop Redirector)\n<ul>\n<li><em>techno59033.download<\/em> (Browlock)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>We have observed the same pattern (or similar pattern) from many sites that had been injected with the ad code snippet.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23552\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/traffic2_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_.png\" data-orig-size=\"732,341\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic2_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_-300x140.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_-600x280.png\" class=\"size-full wp-image-23552 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_.png\" alt=\"\" width=\"732\" height=\"341\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_.png 732w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_-300x140.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/traffic2_-600x280.png 600w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/a><\/p>\n<h3>Redirector<\/h3>\n<p>The redirector page acts as a gateway to the browser locker. On the surface, it is an online shopping store called Shoppers Stop, offering merchandise for men and women. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shoppers_Stop\" target=\"_blank\" rel=\"noopener\">Shoppers Stop<\/a> is also the name of a well-known Indian department store chain with over 83 outlets across the country.\u00a0We believe the scammers may have been using that name to set up either a fake online store or a demo (many scammers are also into website design).<\/p>\n<pre>https:\/\/updating23001[.]accountant\/men-shop<\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23554\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/shoppersstop\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop.png\" data-orig-size=\"965,915\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shoppersstop\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop-300x284.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop-600x569.png\" class=\"size-full wp-image-23554 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop.png\" alt=\"\" width=\"965\" height=\"915\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop.png 965w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop-300x284.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shoppersstop-600x569.png 600w\" sizes=\"auto, (max-width: 965px) 100vw, 965px\" \/><\/a><\/p>\n<p>This domain is itself a clone of goshopper[.]info, which was registered via privacy protection on 2017-10-27 and is now parked:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23578\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/parked-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked.png\" data-orig-size=\"786,486\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"parked\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked-600x371.png\" class=\"size-full wp-image-23578 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked.png\" alt=\"\" width=\"786\" height=\"486\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked.png 786w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/parked-600x371.png 600w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/a><\/p>\n<p>However, in these malicious redirections, the online shopping site is purely used as a redirection mechanism, which is done in such a way that victims will not actually view any of the content. The redirection is done via 301 redirect, also known as a permanent redirect, typically used for SEO purposes by website owners that have moved their property to another (permanent) location.<\/p>\n<pre>location: https:\/\/techno59033[.]download\/TollFree1-877-670-2749<\/pre>\n<p>Performing a search on the address provided in the contact page gives us a lead about a .com domain called\u00a0<em>e-storekart[.]com<\/em> created on November 7, 2017. While there may not seem to be anything special about it (it is yet another clone), its <em>whois<\/em> information provides us a bit more information than the other domains we had cataloged before.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23577\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/contact-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1.png\" data-orig-size=\"1050,567\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"contact\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1-300x162.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1-600x324.png\" class=\"size-full wp-image-23577 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1.png\" alt=\"\" width=\"1050\" height=\"567\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1.png 1050w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1-300x162.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/contact-1-600x324.png 600w\" sizes=\"auto, (max-width: 1050px) 100vw, 1050px\" \/><\/a><\/p>\n<h3>e-storekart<\/h3>\n<p>This domain was one of the few Shoppers Stop templates that didn&#8217;t have a completely anonymized <em>whois<\/em>. Querying on the string <em>bhushan<\/em>, we identified multiple other domains ranging from support sites for printers, help with email, web design, fashion, and more. Many of those domains no longer exist or have already been parked.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23579\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/properties-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1.png\" data-orig-size=\"800,714\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"properties\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1-300x268.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1-600x536.png\" class=\"size-full wp-image-23579 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1.png\" alt=\"\" width=\"800\" height=\"714\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1-300x268.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/properties-1-600x536.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>But even inactive domains can provide some valuable information. For example, we retrieved an archived copy of\u00a0<em>antivirustechies[.]us\u00a0<\/em>that\u00a0shows it used to be a &#8220;legitimate&#8221; tech support page for several different antivirus products.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23544\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/antivirustechies\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies.png\" data-orig-size=\"508,459\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"antivirustechies\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies-300x271.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies.png\" class=\"size-full wp-image-23544 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies.png\" alt=\"\" width=\"508\" height=\"459\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies.png 508w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/antivirustechies-300x271.png 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/p>\n<p>However, the legitimacy of this company was quickly undermined after a few searches for its phone number. It is associated with many\u00a0<a href=\"https:\/\/800notes.com\/Phone.aspx\/1-800-245-9970\" target=\"_blank\" rel=\"noopener\">complaint reports<\/a>\u00a0indicating that people were cold called with the usual scare tactics (fake Microsoft support):<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23545\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/complaint\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint.png\" data-orig-size=\"758,188\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"complaint\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint-300x74.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint-600x149.png\" class=\"size-full wp-image-23545 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint.png\" alt=\"\" width=\"758\" height=\"188\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint.png 758w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint-300x74.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/complaint-600x149.png 600w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/a><\/p>\n<p>Additional evidence comes in the form of a browser-locker template with that exact phone number on a page hosted at\u00a0<em>palmreader[.]website\/1-800-245-9970\/<\/em>. If you recall, the browser locker depicted at the beginning of this article is very much the same. The URL contains the phone number in its path, and the fake Safebrowsing template is similar as well.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23547\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/browlock_number\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number.png\" data-orig-size=\"978,799\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"browlock_number\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number-300x245.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number-600x490.png\" class=\"size-full wp-image-23547 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number.png\" alt=\"\" width=\"978\" height=\"799\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number.png 978w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number-300x245.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/browlock_number-600x490.png 600w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/a><\/p>\n<p>The registration date for that domain goes back to late August 2017. A couple of other phone numbers are also used here, and hardcoded in the URI path, rather than being generated via an API on-the-fly.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23592\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/attachment\/number_browlock\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock.png\" data-orig-size=\"635,273\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"number_browlock\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock-300x129.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock-600x258.png\" class=\"size-full wp-image-23592 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock.png\" alt=\"\" width=\"635\" height=\"273\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock.png 635w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock-300x129.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock-600x258.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/number_browlock-195x85.png 195w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p>To summarize, the same scammer group that used the Shoppers Stop template late last year has already registered a tech support domain (<em>antivirustechies[.]us<\/em>) and a phone number with the same type of browser locker as used in their Shoppers Stop campaign.<\/p>\n<p>While it can be tricky to link threats based on material that could have been stolen from others, this information can also be helpful in discovering interesting connections to additional web properties associated with fraudulent activities.<\/p>\n<p>The Shoppers Stop tech support scam is among the top campaigns we are tracking (trailing just behind the .TK and .CLUB campaigns). It&#8217;s getting a lot of traffic leads from a large number of sites that have been injected with ads, on top of its other malvertising chains.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are protected against this threat thanks to domain blocks on <a href=\"https:\/\/blog.malwarebytes.com\/detections\/oclasrv-com\/\" target=\"_blank\" rel=\"noopener\"><em>oclasrv[.]com<\/em><\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/detections\/deloton-com\/\" target=\"_blank\" rel=\"noopener\"><em>deloton[.]com<\/em><\/a>. We have also reported the advertising IDs we were able to collect to PropellerAds, and the malicious redirector domains\/browlocks to CloudFlare.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>A list of the domains used for the browser lockers can be found <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/Browlocks_ShoppersStop.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/\">Tech support scam uses fake Shoppers Stop site to lure thousands<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 08 May 2018 13:25:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/' title='Tech support scam uses fake Shoppers Stop site to lure thousands'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_677296111-2.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The same group behind the Shoppers Stop tech scam campaign is at it again, injecting malicious ad code into thousands of sites and redirecting to a templated warning page.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wp-vcd\/\" rel=\"tag\">WP-VCD<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/' title='Tech support scam uses fake Shoppers Stop site to lure thousands'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/shoppers-stop-tech-scam-lures-thousands\/\">Tech support scam uses fake Shoppers Stop site to lure thousands<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10531,10510,10577,10494,10545,18327],"class_list":["post-12298","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-malvertising","tag-social-engineering","tag-tech-support-scams","tag-threat-analysis","tag-tss","tag-wp-vcd"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12298"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12298\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}