Over the past 24 hours, cybercriminals spamvertised millions of email addresses, impersonating UPS, in an attempt to trick end users into viewing the malicious .html attachment. Upon viewing, the file loads a tiny iFrame attempting to serve client-side exploit served by the latest version of the Black Hole Exploit kit, which ultimately drops malware on the affected host.

More details:

Sample screenshot of the spamvertised email:

Sample malicious iFrame URLs found in multiple malicious .html files: hxxp://denegnashete.ru:8080/forum/links/column.php; hxxp://soisokdomen.ru:8080/forum/links/column.php; hxxp://diareuomop.ru:8080/forum/links/column.php; hxxp://omahabeachs.ru:8080/forum/links/column.php ;hxxp://penelopochka.ru:8080/forum/showthread.php?page; hxxp://furnitura-forums.ru:8080/forum/showthread.php?page; hxxp://onerussiaboard.ru:8080/forum/showthread.php?page; hxxp://online-gaminatore.ru:8080/forum/showthread.php; hxxp://bmwforummsk.ru:8080/forum/showthread.php?page

Sample detection rate for a malicious .html file found in the spamvertised emails: UPS_N21489880.htm – MD5: 38a2a54d6e7391d7cd00b50ed76b9cfb – detected by 26 out of 43 antivirus scanners as Trojan.Iframe.BCK; Trojan-Downloader.JS.Iframe.dbh

Client-side exploits serving URL: hxxp://denegnashete.ru:8080/forum/data/java.jarMD5: 86946ec2d2031f2b456e804cac4ade6d – detected by 25 out of 43 antivirus scanners as Java/Cve-2012-1723; Exploit:Java/CVE-2012-4681.H

denegnashete.ru is currently responding to the following IPs –;;;;

Related malicious domains part of the campaign’s infrastructure:
rumyniaonline.ru –
denegnashete.ru –
dimabilanch.ru –
ioponeslal.ru –
moskowpulkavo.ru –
omahabeachs.ru –
uzoshkins.ru –
sectantes-x.ru –

Name servers part of the campaign’s infrastructure:
ns1.denegnashete.ru –
ns2.denegnashete.ru –
ns3.denegnashete.ru –
ns4.denegnashete.ru –
ns5.denegnashete.ru –
ns6.denegnashete.ru –

This isn’t the first time that cybercriminals have impersonated UPS. Go through related analysis of previous campaigns impersonating the company:

Webroot SecureAnywhere users are proactively protected from this threat.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on  Twitter.

Blog Staff

About the Author

Blog Staff

The Webroot blog offers expert insights and analysis into the latest cybersecurity trends. Whether you’re a home or business user, we’re dedicated to giving you the awareness and knowledge needed to stay ahead of today’s cyber threats.

Share This