{"id":14931,"date":"2019-03-26T08:10:03","date_gmt":"2019-03-26T16:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/26\/news-8680\/"},"modified":"2019-03-26T08:10:03","modified_gmt":"2019-03-26T16:10:03","slug":"news-8680","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/26\/news-8680\/","title":{"rendered":"Plugin vulnerabilities exploited in traffic monetization schemes"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 26 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<p>In their\u00a0<a href=\"https:\/\/sucuri.net\/reports\/2018-hacked-website-report\" target=\"_blank\" rel=\"noopener\">Website Hack Trend Report<\/a>, web security company Sucuri noted that WordPress infections rose to 90 percent in 2018. One aspect of Content Management System (CMS) infections that is sometimes overlooked is that attackers not only go after the CMSes themselves\u2014WordPress, Drupal, etc.\u2014but also third-party plugins and themes.<\/p>\n<p>While plugins are useful in providing additional features for CMS-run websites, they also increase the surface of attack. Not all plugins are regularly maintained or secure, and some are even abandoned by their developers, leaving behind bugs that will never get fixed.<\/p>\n<p>In the past few months, we have noticed threat actors leveraging several high profile plugin vulnerabilities to redirect traffic toward various monetization schemes, depending on a visitor\u2019s geolocation and other properties. The <a href=\"https:\/\/www.wordfence.com\/blog\/2018\/11\/privilege-escalation-flaw-in-wp-gdpr-compliance-plugin-exploited-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">WordPress GDPR<\/a> compliance plugin vulnerability, and the more recent <a href=\"https:\/\/blog.sucuri.net\/2019\/03\/0day-vulnerability-in-easy-wp-smtp-affects-thousands-of-sites.html\" target=\"_blank\" rel=\"noopener\">Easy WP STMP<\/a> and <a href=\"https:\/\/blog.sucuri.net\/2019\/03\/zero-day-stored-xss-in-social-warfare.html\" target=\"_blank\" rel=\"noopener\">Social Warfare<\/a> vulnerabilities are a few examples of opportunistic attacks quickly adopted in the wild.<\/p>\n<h3>Redirection infrastructure<\/h3>\n<p>Hacked websites can be monetized in different ways, but one of the most popular is to hijack traffic and redirect visitors toward scams and exploits.<\/p>\n<p>We started looking at the latest injection campaign following the notes from Sucuri&#8217;s blog post about the <a href=\"https:\/\/blog.sucuri.net\/2019\/03\/zero-day-stored-xss-in-social-warfare.html\" target=\"_blank\" rel=\"noopener\">Social Warfare zero-day stored XSS<\/a>. According to log data, the automated exploit attempts to load content from a <a href=\"https:\/\/pastebin.com\/raw\/0yJzqbYf\" target=\"_blank\" rel=\"noopener\">Pastebin paste<\/a>, which can be seen below. The obfuscated code reveals one of the domains used by the threat actors:<\/p>\n<div id=\"attachment_27561\" style=\"width: 1037px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27561\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/pastebin-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin.png\" data-orig-size=\"1027,353\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"pastebin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin-300x103.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin-600x206.png\" class=\"wp-image-27561 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin.png\" alt=\"\" width=\"1027\" height=\"353\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin.png 1027w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/pastebin-600x206.png 600w\" sizes=\"auto, (max-width: 1027px) 100vw, 1027px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Pastebin code snippet used in automated attacks against vulnerable plugins<\/p>\n<\/div>\n<p>Our crawlers identified a redirection scheme via the same infrastructure related to these recent plugin hacks. Compromised websites are injected with\u00a0heavily obfuscated code that decodes to\u00a0<em><strong>setforconfigplease[.]com<\/strong><\/em> (the same domain as found in the Pastebin code).<\/p>\n<div id=\"attachment_27565\" style=\"width: 1003px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27565\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/hacked_site_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_.png\" data-orig-size=\"993,869\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hacked_site_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_-300x263.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_-600x525.png\" class=\"wp-image-27565 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_.png\" alt=\"\" width=\"993\" height=\"869\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_.png 993w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_-300x263.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/hacked_site_-600x525.png 600w\" sizes=\"auto, (max-width: 993px) 100vw, 993px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Obfuscated code injected into hacked site<\/p>\n<\/div>\n<p>The first layer of redirection goes to domains hosted on\u00a0<strong><em>176.123.9[.]52<\/em><\/strong> and <strong><em>176.123.9[.]53<\/em><\/strong> that will perform the second redirect via a .tk domain. Denis from Sucuri has tracked the evolution and rotation of these domains during the past few days.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">New domain used in the &quot;Easy WP SMTP&quot; and &quot;Social Warfare&quot; (and some other) attacks \u2014 redrentalservice[.]com \u2014 registered 2019-03-21. Replacement for setforconfigplease[.]com (registered on March 4). <a href=\"https:\/\/t.co\/2RWVxhLrfb\">https:\/\/t.co\/2RWVxhLrfb<\/a> and <a href=\"https:\/\/t.co\/lqse0IwR61\">https:\/\/t.co\/lqse0IwR61<\/a><\/p>\n<p>&mdash; Denis (@unmaskparasites) <a href=\"https:\/\/twitter.com\/unmaskparasites\/status\/1109085601763155970?ref_src=twsrc%5Etfw\">March 22, 2019<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Based on our telemetry, the majority of users redirected in this campaign are from Brazil, followed by the US and France:<\/p>\n<div id=\"attachment_27590\" style=\"width: 868px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27590\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/map_stats\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats.png\" data-orig-size=\"858,499\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"map_stats\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats-300x174.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats-600x349.png\" class=\"wp-image-27590 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats.png\" alt=\"\" width=\"858\" height=\"499\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats.png 858w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats-300x174.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/map_stats-600x349.png 600w\" sizes=\"auto, (max-width: 858px) 100vw, 858px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Top detections based on visitors&#8217; country of origin<\/p>\n<\/div>\n<h3>Scams, malvertising, and more<\/h3>\n<p>The goal of this campaign (and other similar ones) is traffic monetization. Threat actors get paid to redirect traffic from compromised sites to a variety of scams and other profit-generating schemes. Over the past few months, we have been following this active redirection campaign involving the same infrastructure described earlier.<\/p>\n<p>Keeping track of any ongoing threat gives insight into the threat actor&#8217;s playbook\u2014whether changes are big or small. Code may go through iterations, from clear text to obfuscated, or perhaps may contain new features.<\/p>\n<p>While there are literally dozens of final payloads based on geolocation and browser type delivered in this campaign, we focused on a few popular ones that people are likely to encounter. By hijacking traffic from thousands of hacked websites, the crooks fingerprint and redirect their victims while trying to avoid getting blocked.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_27570\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27570\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/diagram-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram.png\" data-orig-size=\"817,722\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"diagram\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram-300x265.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram-600x530.png\" class=\"wp-image-27570\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram.png\" alt=\"\" width=\"614\" height=\"543\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram.png 817w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram-300x265.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/diagram-600x530.png 600w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Traffic redirections by payload type<\/p>\n<\/div>\n<h4>Browser lockers and tech support scams<\/h4>\n<p>Historically, we have seen this sub campaign as one of the main purveyors of browser lockers, used by tech support scammers. New domains with the .tk TLD are generated every few minutes to act as redirectors to browlocks. Back in October 2018, <a href=\"https:\/\/blog.sucuri.net\/2018\/10\/multiple-ways-to-inject-the-same-tech-support-scam-malware.html\" target=\"_blank\" rel=\"noopener\">Sucuri mentioned this active campaign<\/a> abusing old\u00a0tagDiv themes and unpatched versions of the Smart Google Code Inserter plugin.<\/p>\n<p>Browser lockers continue to be a popular social engineering tool to scare people into thinking their computers are infected and locked up. While there is no real malware involved, there are clever bits of JavaScript that have given browser vendors headaches. The &#8220;evil cursor&#8221; is one of those tricks that effectively prevents users from closing a tab or browser window, and has <a href=\"https:\/\/www.zdnet.com\/article\/google-fixes-chrome-evil-cursor-bug-abused-by-tech-support-scam-sites\/\" target=\"_blank\" rel=\"noopener\">just been recently fixed<\/a>.<\/p>\n<div id=\"attachment_27560\" style=\"width: 604px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27560\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/tss_traffic-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic.png\" data-orig-size=\"594,789\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"tss_traffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic-226x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic-452x600.png\" class=\"wp-image-27560 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic.png\" alt=\"\" width=\"594\" height=\"789\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic.png 594w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic-226x300.png 226w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/tss_traffic-452x600.png 452w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Browlock urging victims to call fake Microsoft support<\/p>\n<\/div>\n<h4>Ad fraud<\/h4>\n<p>One particular case we documented deals with ad fraud via\u00a0decoy sites that look like blogs to display Google Ads. This fraudulent scheme was\u00a0<a href=\"https:\/\/www.zscaler.com\/blogs\/research\/spam-campaigns-leveraging-tk-domains\" target=\"_blank\" rel=\"noopener\">exposed<\/a>\u00a0back in August, showing how traffic from hacked sites could generate $20,000 in ad revenue per month.<\/p>\n<p>However, in a twist implemented shortly after, the fraudsters fooled users that attempted to close the ad and hijacked their mouse to actually click on the ad instead. Indeed, as you move your mouse cursor toward the X, the ad banner shifts up and rather than closing the ad, your click opens it up.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/click_fraud.gif\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27555\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/click_fraud\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/click_fraud.gif\" data-orig-size=\"829,778\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"click_fraud\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/click_fraud-300x282.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/click_fraud-600x563.gif\" class=\"size-full wp-image-27555 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/click_fraud.gif\" alt=\"\" width=\"829\" height=\"778\" \/><\/a><\/p>\n<p>The crooks use CSS code dynamically appended to the page that monitors the mouse cursor and reacts when it comes over the X. The timing is important to capture the click a few milliseconds later when the ad banner comes in focus.\u00a0These client-side tricks are implemented to maximize ad profits, since revenue generated from ad clicks is much higher.<\/p>\n<div id=\"attachment_27557\" style=\"width: 525px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27557\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/css_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_.png\" data-orig-size=\"515,684\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"css_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_-226x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_-452x600.png\" class=\"wp-image-27557 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_.png\" alt=\"\" width=\"515\" height=\"684\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_.png 515w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_-226x300.png 226w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/css_-452x600.png 452w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">CSS code responsible for click fraud<\/p>\n<\/div>\n<h4>Malvertising and pop-ups<\/h4>\n<p>There is no end to the number of malvertising schemes criminals can deploy. A particularly sneaky one is abusing the push notifications for Chrome, a feature that is a <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2019\/01\/browser-push-notifications-feature-asking-abused\/\" target=\"_blank\" rel=\"noopener\">rogue advertiser&#8217;s dream<\/a>. This allows websites to pop notifications in the bottom right corner of your screen even while you are not browsing the site in question. Those pop-ups tend to be snake oil PC optimizers and adult webcams or solicitations.<\/p>\n<div id=\"attachment_27559\" style=\"width: 678px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27559\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/push_notifications\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications.png\" data-orig-size=\"668,535\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"push_notifications\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications-300x240.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications-600x481.png\" class=\"wp-image-27559 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications.png\" alt=\"\" width=\"668\" height=\"535\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications.png 668w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications-300x240.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/push_notifications-600x481.png 600w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Fake video player tricking users to accept notifications<\/p>\n<\/div>\n<h4>Form scrapers and skimmers<\/h4>\n<p>For a brief period of time, we saw the addition of a JavaScript scraper and what appeared to be a rudimentary skimmer in some traffic chains. It is unclear what the purpose was, unless it was some kind of experiment coupled with the regular .tk redirects.<\/p>\n<p>Skimmers are most commonly found on e-commerce sites, in particular those running the Magento CMS. They are probably the most lucrative way to monetize a hacked site, unless, of course, there&#8217;s no user data to steal, in which case malicious redirects are second best.<\/p>\n<div id=\"attachment_27587\" style=\"width: 646px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27587\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/attachment\/scrapers\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers.png\" data-orig-size=\"636,1185\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"scrapers\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers-161x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers-322x600.png\" class=\"wp-image-27587 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers.png\" alt=\"\" width=\"636\" height=\"1185\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers.png 636w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers-161x300.png 161w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/scrapers-322x600.png 322w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Form scraper and skimmer identified in redirection infrastructure<\/p>\n<\/div>\n<h3>Website traffic as a commodity<\/h3>\n<p>Website security is similar to computer security in that site owners are also exposed to zero-day exploits and must always patch. Yet, without proactive protection (i.e. web application firewall) and with site owners failing to roll out their security updates in a timely manner, zero-days can be incredibly effective.<\/p>\n<p>When critical vulnerabilities are discovered, it can be a matter of hours before exploitation in the wild is observed. Compromised websites turn into a commodity relied upon for various monetization schemes, which in turn feeds into the buying and selling of malicious traffic.<\/p>\n<p><a href=\"http:\/\/www.malwarebytes.com\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are protected against these scams, thanks to our web-blocking capabilities. For additional protection with browser lockers, forced extensions, and other scams we recommend our browser extension.<\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>176.123.9[.]52<\/p>\n<p>redrentalservice[.]com<br \/> setforconfigplease[.]com<br \/> somelandingpage[.]com<br \/> setforspecialdomain[.]com<br \/> getmyconfigplease[.]com<br \/> getmyfreetraffic[.]com<\/p>\n<p>176.123.9[.]53<\/p>\n<p>verybeatifulpear[.]com<br \/> thebiggestfavoritemake[.]com<br \/> stopenumarationsz[.]com<br \/> strangefullthiggngs[.]com<\/p>\n<p>simpleoneline[.]online<br \/> lastdaysonlines[.]com<br \/> cdnwebsiteforyou[.]biz<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/\">Plugin vulnerabilities exploited in traffic monetization schemes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 26 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/' title='Plugin vulnerabilities exploited in traffic monetization schemes'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/shutterstock_701809519.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The latest round of vulnerable WordPress plugins leads to an active traffic monetization campaign via hacked websites.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/criminals\/\" rel=\"category tag\">Criminals<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/easy-wp-stmp\/\" rel=\"tag\">Easy WP STMP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacked\/\" rel=\"tag\">hacked<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/plugins\/\" rel=\"tag\">plugins<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scams\/\" rel=\"tag\">scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-warfare\/\" rel=\"tag\">Social Warfare<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/traffic\/\" rel=\"tag\">traffic<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wordpress-gdpr\/\" rel=\"tag\">WordPress GDPR<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/' title='Plugin vulnerabilities exploited in traffic monetization schemes'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/plugin-vulnerabilities-exploited-traffic-monetization-schemes\/\">Plugin vulnerabilities exploited in traffic monetization schemes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,3108,21379,15234,10531,17346,10574,19623,21380,10494,906,21381],"class_list":["post-14931","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-criminals","tag-easy-wp-stmp","tag-hacked","tag-malvertising","tag-plugins","tag-scams","tag-skimmer","tag-social-warfare","tag-threat-analysis","tag-traffic","tag-wordpress-gdpr"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14931"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14931\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}