November 2, 2012Dancho Danchev By Dancho Danchev

‘ADP Immediate Notification’ themed emails lead to Black Hole Exploit Kit

Newsflash, the cybercriminals behind the recently profiled malicious campaign impersonating Bank of America, launched yet another massive spam campaign, this time targeting ADP customers. Upon clicking on the link found in the malicious email, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit.

More details:

Sample screenshot of the spamvertised email:

Compromised malicious URLs spamvertised in the campaign: hxxp://; hxxp://; hxxp://; hxxp://; hxxp://; hxxp://; hxxp://

Client-side exploits serving URL: hxxp:// –, AS3301 – Email:; hxxp:// –, AS3301 – Email:

Responding to the same IP are also the following malicious domains: – Email: – Email: – Email: – Email:

Name servers part of the campaign’s infrastructure:

We’ve already seen the same name servers used in the recently profiled “BofA ‘Online Banking Passcode Reset’ themed emails serve client-side exploits and malware” malicious campaign. Clearly, the cybercriminal or gang of cybercriminals behind the campaign continue rotating the impersonated brands, next to using the same malicious infrastructure to achieve their objectives.

Webroot SecureAnywhere users are proactively protected from these threats.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on  Twitter.

Share Button