Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1355514
  • 博文数量: 416
  • 博客积分: 13005
  • 博客等级: 上将
  • 技术积分: 3297
  • 用 户 组: 普通用户
  • 注册时间: 2006-04-05 16:26
文章分类

全部博文(416)

文章存档

2014年(1)

2013年(4)

2012年(46)

2011年(64)

2010年(12)

2009年(4)

2008年(40)

2007年(187)

2006年(58)

分类: 网络与安全

2012-03-30 11:07:09

Spamvertised Verizon-themed ‘Your Bill Is Now Available’ emails lead to ZeuS crimeware

By Dancho Danchev

Cybercriminals newest spamvertised malware campaign is brand-jacking Verizon Wireless in an attempt to trick end users into clicking on the malicious links embedded in the email.

More details:

The campaign is relying on thousands of compromised legitimate web sites, where a tiny javascript file (.js) is hosted in an attempt to trick Web reputation filters into thinking the content is served from a legitimate web sites. The campaign is ultimately redirecting to a BlackHole web malware exploitation kit at hxxp://slickcurve.com/showthread.php?t=d7ad916d1c0396ff which drops the following MD5:99FAB94FD824737393F5184685E8EDF2.

It’s being launched by the same cybercriminals that launched last week’s “Malicious USPS-themed emails circulating in the wild” campaign, as both campaigns share the same directory/exploit-serving structure.

The MD5 is using the following dropzone for sending back the intercepted accounting data from the infected PCs - hxxp://176.28.18.135:8080/pony/gate.php Now where have we seen this IP before? In last week’s “Spamvertised LinkedIn notifications serving client-side exploits and malware” malware campaign where 176.28.18.135 was serving  client-side exploits through the BlackHole web malware exploitation kit.

The MD5 also attempts to contact the following dropzones is 176.28.18.135 is unavailable:

  • hxxp://85.214.243.87:8080/pony/gate.php 
  • hxxp://88.85.99.44:8080/pony/gate.php

It also downloads a copy of the ZeuS crimeware, using the following MD5:86A548CADA5636B4A8ED7DE5F654FF96

Webroot security researchers will continue monitoring the campaign, to ensure that Webroot SecureAnywhere customers are protected from this ongoing threat.

You can find more about Dancho Danchev at his . You can also .

阅读(748) | 评论(1) | 转发(0) |
给主人留下些什么吧!~~

a1234567mdy2012-03-30 11:16:37

下载地址  hotelrelaxinnbsw.com/4M6.exe
md5:bdd23951ae353d0b94688445fb497d5f