{"id":7398,"date":"2017-04-20T08:11:28","date_gmt":"2017-04-20T16:11:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1189\/"},"modified":"2017-04-20T08:11:28","modified_gmt":"2017-04-20T16:11:28","slug":"news-1189","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1189\/","title":{"rendered":"Binary Options malvertising campaign drops ISFB banking Trojan"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 20 Apr 2017 15:00:55 +0000<\/strong><\/p>\n<p>We have been witnessing a series of malvertising attacks\u00a0that keep a low profile with decoy websites and strong IP address filtering. We are calling it the &#8216;Binary Options&#8217; campaign because the threat actor is using the front of a trading company to hide the real nature of his\u00a0business.<\/p>\n<p>There have been similar uses of fake fa\u00e7ades as a gateway to exploit kits. For instance, Magnitude EK is known to use gates that have to do with Bitcoin, investment websites and\u00a0such, as detailed in this Proofpoint <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/magnitude-actor-social-engineering-scheme-windows-10\" target=\"_blank\">blog entry<\/a>.<\/p>\n<p>In this particular case, the threat actor\u00a0stole the web template from &#8220;<em>Capital World Option<\/em>&#8220;, a company that provides a platform for trading binary options. Participants must\u00a0predict whether the price of an asset will rise or fall within a given time frame, which defines whether or not they will make money. Binary options have earned a bad reputation though and some countries have even banned them.<\/p>\n<h3>Fraudulent\u00a0infrastructure<\/h3>\n<p>Below is a screenshot of the legitimate website that is being impersonated. There are some differences between the real one and the fakes; the former is using SSL and was registered a while\u00a0ago. Also, some of the website functionality is not working properly with the decoy versions.<\/p>\n<p>Legitimate site:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17544\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2.png\" alt=\"\" width=\"1581\" height=\"888\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2.png 1581w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2-300x169.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2-600x337.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2-900x506.png 900w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/real2-400x225.png 400w\" sizes=\"auto, (max-width: 1581px) 100vw, 1581px\" \/><\/a><\/p>\n<p>Decoy site that ripped all the branding:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17542\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake.png\" alt=\"\" width=\"1577\" height=\"882\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake.png 1577w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake-300x168.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake-600x336.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/fake-400x225.png 400w\" sizes=\"auto, (max-width: 1577px) 100vw, 1577px\" \/><\/a><\/p>\n<p>Those fake\u00a0sites are\u00a0only meant to be viewed if you are not a target of this particular malware campaign. In other words, if you load the infection chain from the malvertising call and see the site, you will not be infected. Infections happen when the fraudulent server forwards victims directly to a second gate, without showing them any of the site&#8217;s content.<\/p>\n<p>The same threat actor has registered many different domains all purporting to be lookalikes using a\u00a0similar naming convention. The recent creation\u00a0dates for these decoy sites is a hint that they\u00a0are not likely to be legitimate:<\/p>\n<pre class=\"p1\"><span class=\"s1\">Domain Name: CAPITALWORLDOPTION.COM<\/span>  <span class=\"s1\">Creation Date: 2017-04-04T09:15:14Z<\/span>  <span class=\"s1\">Registrar: PDR Ltd. d\/b\/a PublicDomainRegistry.com<\/span>  <span class=\"s1\">Registrant Email: detes55@mail.ru<\/span><\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/casefile.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17551 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/casefile.png\" alt=\"\" width=\"840\" height=\"884\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/casefile.png 840w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/casefile-285x300.png 285w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/casefile-570x600.png 570w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/a><\/p>\n<h3>Malvertising chain<\/h3>\n<p>The attack\u00a0starts off with an ad call from one of a few ad networks\u00a0(Popads, PlugRush were detected in our telemetry) and redirects users to the decoy website where a quick IP check is performed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17553\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/1stgate.png\" alt=\"\" width=\"687\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/1stgate.png 687w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/1stgate-300x121.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/1stgate-600x241.png 600w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/p>\n<p>Only legitimate users will be redirected to the second stage server, which also performs its own check. Once again, unwanted traffic will be dumped (and a message &#8211; perhaps from the threat actor? &#8211; &#8220;<em>No time for rent<\/em>&#8221; passed in the URL):<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/404_message.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17554\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/404_message.png\" alt=\"\" width=\"671\" height=\"308\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/404_message.png 671w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/404_message-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/404_message-600x275.png 600w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/a><\/p>\n<p>Otherwise, users that have made it past those two gates will be presented with the RIG exploit kit.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Flow__.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17564\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Flow__.png\" alt=\"\" width=\"679\" height=\"881\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Flow__.png 679w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Flow__-231x300.png 231w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/Flow__-462x600.png 462w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/a><\/p>\n<h3>Banking Trojan<\/h3>\n<p>The final payload consistently distributed via this campaign (across\u00a0different geolocations) appears to be an ISFB variant (AKA Dreambot, Gozi,\u00a0Usrnif), based off an old but resilient banking Trojan. Some of its features include web injects for\u00a0the victims&#8217; browsers, screenshoting, video recording, transparent redirections, etc.<\/p>\n<p>The artifacts left on the system were\u00a0very similar to those described in a Proofpoint <a href=\"https:\/\/www.proofpoint.com\/au\/threat-insight\/post\/ursnif-variant-dreambot-adds-tor-functionality\" target=\"_blank\">blog<\/a> about Dreambot and the samples we collected also download a Tor client. The registry entry for the Tor client can be seen below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/registry.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17571\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/registry.png\" alt=\"\" width=\"889\" height=\"259\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/registry.png 889w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/registry-300x87.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/registry-600x175.png 600w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/a><\/p>\n<h4><strong>Modular structure<\/strong><\/h4>\n<p class=\"p1\">The sample\u00a0retrieves several modules once it sets hold onto a victim machine and below is\u00a0an overview:<\/p>\n<p class=\"p1\"><em><strong><span class=\"s1\">Original Dropper<\/span><\/strong><\/em><\/p>\n<p class=\"p1\" style=\"padding-left: 30px\"><span class=\"s1\">-&gt; <strong><em>loader.dll<\/em><\/strong> injected into <em>svchost.exe<\/em><\/span><\/p>\n<p class=\"p1\" style=\"padding-left: 30px\"><span class=\"s1\">-&gt; <strong><em>client.dll<\/em><\/strong> and <strong><em>tordll.dll<\/em><\/strong>\u00a0downloaded and injected into <em>explorer.exe<\/em> and into browsers<\/span><\/p>\n<p>The main executable injects a file (<em>loader.dll<\/em>)\u00a0into svchost.exe in order to download other modules which are encrypted during transport (<em>tor.dll<\/em> and <em>client.dll<\/em>) both available in 32 and 64 bits:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/modules_download.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17560\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/modules_download.png\" alt=\"\" width=\"558\" height=\"110\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/modules_download.png 558w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/modules_download-300x59.png 300w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\" \/><\/a><\/p>\n<p>We can notice the &#8220;ISFB&#8221; signature within the malware\u00a0code:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/isfb_string_.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17562\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/isfb_string_.png\" alt=\"\" width=\"460\" height=\"317\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/isfb_string_.png 460w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/isfb_string_-300x207.png 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/a><\/p>\n<p>This piece of malware\u00a0has some anti-VM features, for example, it checks on the mouse cursor:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17563\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/get_cursor.png\" alt=\"\" width=\"452\" height=\"339\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/get_cursor.png 452w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/get_cursor-300x225.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/p>\n<p>Modules are injected into <em>explorer.exe<\/em> and try to establish a connection to an .onion address. Browsers are also injected, via <em>client.dll<\/em> as depicted below with Mozilla Firefox:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/injected_to_firefox_.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17561\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/injected_to_firefox_.png\" alt=\"\" width=\"750\" height=\"611\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/injected_to_firefox_.png 750w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/injected_to_firefox_-300x244.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/injected_to_firefox_-600x489.png 600w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<p>There are scores of hosts that are contacted post infection, as well as the Tor connections that trigger many ET rules as <em>ET TOR Known Tor Relay\/Router (Not Exit) Node Traffic group<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17565\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/map.png\" alt=\"\" width=\"793\" height=\"460\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/map.png 793w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/map-300x174.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/map-600x348.png 600w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>This particular campaign focused on a very specific malvertising chain leading to the RIG exploit kit and &#8211; as far as we could tell &#8211; dropping the same payload each time, no matter the geolocation of the victim.<\/p>\n<p>Banking Trojans have been a little bit forgotten about these days as they are overshadowed by ransomware. However, they still represent a significant threat and actually do operate safely in the shadows, manipulating banking portals to perform wire transfers unbeknownst to their victims or even the banks they are targeting.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/premium\/\" target=\"_blank\">Malwarebytes users<\/a> are protected against this threat at various levels: domain and IP blocks, exploit mitigation for RIG EK, and detection of the malware payloads.<\/p>\n<h3>Related material<\/h3>\n<ul>\n<li>Proofpoint: <a href=\"https:\/\/www.proofpoint.com\/au\/threat-insight\/post\/ursnif-variant-dreambot-adds-tor-functionality\" target=\"_blank\"><em>Nigthmare on Tor street: Ursnif variant Dreambot adds Tor functionality<\/em><\/a><\/li>\n<li>Maciej Kotowicz, BotConf:\u00a0<em><a href=\"https:\/\/www.youtube.com\/watch?v=Nm7d_k0_yOM\" data-rel=\"lightbox-video-0\" target=\"_blank\">ISFB, Still Live and Kicking<\/a><\/em><\/li>\n<\/ul>\n<h3>IOCs<\/h3>\n<p>&#8216;Binary Options&#8217; domains:<\/p>\n<pre>all-binarys-option.com  all-binarys-options.com  binaryoptionleader.com  binaryoptionleaders.com  binarysfinanceoptions.com  binarysoption.com  binarys-option.com  binarysoptionleader.com  binarysoptionleaders.com  binarysoptions.com  binarys-options.com  binarysoptionsfinance.com  binarysoptionsleader.com  binarysoptionsleaders.com  capitalworldoption.com  financebinarysoptions.com  financeoptionbinarys.com  financeoptionsbinarys.com  financesoptionbinary.com  financesoptionbinarys.com  financesoptionsbinary.com  financesoptionsbinarys.com  opteckoption.com  <\/pre>\n<p>&#8216;Binary options&#8217; IP addresses:<\/p>\n<pre>217.23.1.65  217.23.1.66  217.23.1.67  217.23.1.104  217.23.1.130  217.23.1.187  217.23.1.200<\/pre>\n<p>Redirects:<\/p>\n<pre>basefont.ul-8.moskvi.ru\/user5.php  p.figcaption-7.nfl.si\/user5.php  command.bdo-3.mirifictour.ro\/user5.php  menu.command-2.moskvi.ru\/user5.php  code.a-10.moskvi.ru\/user5.php  header.h5-2.mirifictour.ro\/user5.php  input.noframes-8.narovlya.ru\/user5.php  col.output-9.nfl.si\/user5.php  meter.em-8.narovlya.ru\/user5.php  applet.x-3.nomundodapaula.com.br\/user5.php<\/pre>\n<p>Payloads from different geos (ISFB):<\/p>\n<pre>f2f8843673000b082ad08bd555c8cd023918a3c11af9d74e9fa98f3b1304b6be  f12bc471f040146318a6fbd2879a95d947d494bd0b869dc95c01cfc22af0ab13  61dd7aa2ca44371b7c8cd4dc9e5f3bd05a8c6213d8e6357dfdb9034b1c0fd590  aed39345668d24dced4b83c36321e98ec9f09af3044b94ceecf01662de0189ab<\/pre>\n<p>Post infection traffic:<\/p>\n<pre>158.69.176.173\/images\/zln7qsefZ961EfLVkD3\/0FmzZhicPZalFMUtdp9E0C\/JxRcPKmDA9QAA\/dNCE_2Bz\/nFe1Bp_2FQNkn0aOHQCqpjG\/33nc7lV8N1\/jqOZO3jD875TzqQe2\/H4W4lqjSRyxC\/y8DoNHjxcTr\/G95nFCsQ3Okctfp6\/BiJ\/.avi  158.69.176.173\/images\/KziuBbVMi\/s2WSfAlAnamELXfRux7g\/hq2LcDlwVjaxz0wE5od\/9arE_2F5SMgQT998TrddNM\/4d_2BLLUe0pfm\/epm_2Fgg\/3RjjJAXl_2BNDeRmGWmDepV\/uMhwCLFDJQ\/gkVfwnDYZJfM9VuaZ\/J0K10GnIYbAf\/EFUtmfqTfj0\/I2i5fuZ6\/1Rys9uq\/.avi  158.69.176.173\/images\/xeF9Qj1PPNbvhLGetscM\/N_2FnVKgMXfiY05zWnD\/WL5p5iqJTPu43MoqB_2FZ8\/y_2BMpwWHCygC\/iIfdEdE4\/zCDZ_2FYukajKGJu2XwR_2F\/5gPQp0gmRe\/6Nms6WfWADsw0I92V\/k_2FmprVONWQ\/1YP45RKaYhQ\/ZOFhK6V\/.avi  158.69.176.173\/images\/smmqGoxf\/caltlwZ4eJEFQRiF13_2FDr\/jb3Lhoj5l3\/3C3I8HbwUcIkIKNfL\/GIUnsu0NJ4bJ\/ZXPEqKW98uh\/zBpYxDhxeVIPy6\/cYD1wzpUZwSX4VlTDrU_2\/Be4T8_2BuFE_2BWW\/MED1GtDjNb13kH2\/L77gQOYerQ\/4\/.avi  158.69.176.173\/tor\/t64.dll  ip-addr.es\/  aeeeeeeeeeeeeeeeeeeeeeeeeeeeva.onion\/images\/skmTPhNwp9NVU\/_2F4G_2B\/uO_2FVNwGzKHjF6XXm_2FwR\/ozV3WtHKFN\/qHCZk_2F3zfY5Tun4\/1_2BY1OBwXA5\/h78wUMDgWOn\/Oa3902QJKJepaG\/gUyn6OwepJp_2FOUDt5DR\/ghzi_2F0if2w_2F_\/2FdLkzlJyrJBEYQ\/JpqpaM_2Fe9ZGGJ0sH\/0PPW00gpm\/fw759RTtukH4CWzHzdgY\/YeqpElX.jpeg  aeeeeeeeeeeeeeeeeeeeeeeeeeeeva.onion\/images\/mUKxVkxTd4\/jVGmdXz5wgukSnoqn\/dHI0tQ0GMoHy\/t33eKJEj_2B\/eJhlUIVkjtD0_2\/FQQ_2BYinpCl5HhsfJrU4\/yvNBC3qaWv_2FVe4\/E_2Fx7bI21jWxgd\/zVb0J5JvNu2Lw16DFS\/54MHtYxkR\/SAahGsIeNYj7btD7lEtU\/WXJ_2FZExsnS_2FrMYl\/_2FpoHgPSdiun20G8AgOLX\/G1pu.gif<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/binary-options-malvertising-campaign-drops-isfb-banking-trojan\/\">Binary Options malvertising campaign drops ISFB banking Trojan<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/binary-options-malvertising-campaign-drops-isfb-banking-trojan\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 20 Apr 2017 15:00:55 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/binary-options-malvertising-campaign-drops-isfb-banking-trojan\/' title='Binary Options malvertising campaign drops ISFB banking Trojan'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/04\/photodune-1363536-two-dice-laying-over-a-pile-of-money-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at a widespread and yet stealthy malvertising campaign distributing the ISFB banking Trojan via decoy websites.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/binary-options\/\" rel=\"tag\">binary options<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dreambot\/\" rel=\"tag\">dreambot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gozi\/\" rel=\"tag\">Gozi<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/isfb\/\" rel=\"tag\">ISFB<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig-exploit-kit\/\" rel=\"tag\">RIG exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/binary-options-malvertising-campaign-drops-isfb-banking-trojan\/' title='Binary Options malvertising campaign drops ISFB banking Trojan'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/binary-options-malvertising-campaign-drops-isfb-banking-trojan\/\">Binary Options malvertising campaign drops ISFB banking Trojan<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12041,12042,10527,10534,10987,12043,12044,10531,3764,11589,11038,10494,10833],"class_list":["post-7398","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-binary-options","tag-dreambot","tag-ek","tag-exploit-kit","tag-exploits","tag-gozi","tag-isfb","tag-malvertising","tag-malware","tag-rig","tag-rig-exploit-kit","tag-threat-analysis","tag-trojan"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7398"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7398\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}