{"id":15215,"date":"2013-12-05T10:11:18","date_gmt":"2013-12-05T17:11:18","guid":{"rendered":"https://www.webroot.com/blog/?p=15215"},"modified":"2024-01-23T11:09:56","modified_gmt":"2024-01-23T18:09:56","slug":"compromised-legitimate-web-sites-expose-users-malicious-javasymbianandroid-browser-updates","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/12\/05\/compromised-legitimate-web-sites-expose-users-malicious-javasymbianandroid-browser-updates\/","title":{"rendered":"Compromised legitimate Web sites expose users to malicious Java\/Symbian\/Android &#8220;Browser Updates&#8221;"},"content":{"rendered":"<p>We&#8217;ve just intercepted a currently active malicious campaign, relying on redirectors placed at <a href=\"https://www.webroot.com/blog/2013\/01\/22\/android-malware-spreads-through-compromised-legitimate-web-sites\/\"><strong>compromised\/hacked legitimate Web sites<\/strong><\/a>, for the purpose of hijacking the legitimate traffic and directly exposing it to multi mobile OS based malicious\/fraudulent content. In this particular case, a bogus &#8220;<a href=\"http:\/\/ddanchev.blogspot.com\/2013\/11\/fake-chromefirefoxinternet.html\"><strong>Browser Update<\/strong><\/a>&#8220;, which in reality is a <a href=\"http:\/\/ddanchev.blogspot.com\/2013\/11\/a-peek-inside-customer-ized-api-enabled.html\"><strong>premium rate SMS malware<\/strong><\/a>.<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the landing page upon automatic redirection:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Compromised_Sites_Traffic_Exchange_Android_Java_Symbian_Malware_Fake_Browser_Update.png\"><img decoding=\"async\" loading=\"lazy\" width=\"611\" height=\"339\" class=\"size-full wp-image-15216 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Compromised_Sites_Traffic_Exchange_Android_Java_Symbian_Malware_Fake_Browser_Update.png\" alt=\"Compromised_Sites_Traffic_Exchange_Android_Java_Symbian_Malware_Fake_Browser_Update\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Compromised_Sites_Traffic_Exchange_Android_Java_Symbian_Malware_Fake_Browser_Update.png 611w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Compromised_Sites_Traffic_Exchange_Android_Java_Symbian_Malware_Fake_Browser_Update-300x166.png 300w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Landing page upon redirection:<\/strong> <em>hxxp:\/\/mobleq.com\/e\/4366<\/em><\/p>\n<p><strong>Domain name reconnaissance:<\/strong><br \/>\nmobleq.com &#8211; 91.202.63.75<\/p>\n<p><strong>Known to have responded to the same IP, are also the following malicious domains:<\/strong><br \/>\n700cams.com<br \/>\nadflyse.biz<br \/>\nandroid-loads.biz<br \/>\nandroids-free.net<br \/>\nandroiduptd.ru<br \/>\nandroidwapupdate.info<br \/>\nantivirus-updatesup.ru<br \/>\nbest-ponoz.ru<br \/>\nbests-cafe.ru<br \/>\nbilmobz.ru<br \/>\nbovkama.ru<br \/>\nchenyezhe.ru<br \/>\nclipsxxx-erotub.ru<br \/>\ncritical-mobiles.ru<br \/>\ndownapp.mobi<br \/>\ndownloadit.biz<br \/>\ndownloads-apk-games.ru<br \/>\nero-home-tube.net<br \/>\nero-odkl.ru<br \/>\nexmoby18.ru<br \/>\nffmobistream.ru<br \/>\nffreemob.ru<br \/>\nfilemobileses.ru<br \/>\nflv-criticalnews.ru<br \/>\ngalaxy-comp.ru<br \/>\ngame-for-androis.ru<br \/>\ngdz-allnews.ru<br \/>\ngosal.ru<br \/>\nimobit.ru<br \/>\njavamix-games.ru<br \/>\njmobf.ru<br \/>\njmobi.net<br \/>\njsfilemobile.ru<br \/>\njugar-online.ru<br \/>\nkinope4ka.com<br \/>\nlobimob.ru<br \/>\nluganets.ru<br \/>\nmabilkos.ru<br \/>\nmarket-soft-android.ru<br \/>\nmarketandroidplay.ru<br \/>\nmitstoksot.tk<br \/>\nmobi-klik-ok.ru<br \/>\nmobicheck2.ru<br \/>\nmobidick7a1.ru<br \/>\nmobilabs.biz<br \/>\nmobileup-news.ru<br \/>\nmobiseks.ru<br \/>\nmobitraf.net<br \/>\nmoblabes.ru<br \/>\nmobleq.com<br \/>\nmoblik.net<br \/>\nmoblius.ru<br \/>\nmoblob.ru<br \/>\nmobqid.ru<br \/>\nmobsob.ru<br \/>\nmobuna.net<br \/>\nmoby-aa.ru<br \/>\nmobyboom.ru<br \/>\nmollius.ru<br \/>\nmombut.ru<br \/>\nmp3-pesni.ru<br \/>\nmp3-pesnja.ru<br \/>\nmtr7.ru<br \/>\nmuzico-server4.ru<br \/>\nneolemsan.ru<br \/>\nodmobil.ru<br \/>\nodnoklassniki-android1.ru<br \/>\nodnoklassniki-android7.ru<br \/>\nodnoklassniki-androidmobi.ru<br \/>\nodnoklassniki-mobile1.ru<br \/>\nolcocom.ru<br \/>\nold-games.ws<br \/>\nomoby.net<br \/>\notdacham.ru<br \/>\npornforjoin.ru<br \/>\npornushniks.ru<br \/>\nrelaxtube.ru<br \/>\nrrmobi.net<br \/>\ns1.krash.net<br \/>\nsexpirat.ru<br \/>\nsfsss.ru<br \/>\nsotsialniiklimat.ru<br \/>\ntampoka.ru<br \/>\ntstomoby.ru<br \/>\ntubevubes.ru<br \/>\nvkoterske.ru<br \/>\nvpleer-server3.ru<br \/>\nvzlomaandroid.ru<br \/>\nwaprus.tk<br \/>\nwildmob.net<br \/>\nwwwmobitds.ru<br \/>\nxlovs.ru<br \/>\nxmassne.ru<br \/>\nxmoblz.ru<\/p>\n<p><strong>Detection rates for the multi mobile platform variants:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/22278cc82c79d1ea4328d633b9f935db3020e626ade7c77a889d36e1b3b19fce\/analysis\/\"><strong>MD5: a4b7be4c2ad757a5a41e6172b450b617<\/strong><\/a> &#8211; detected by 13 out of 46 antivirus scanners as HEUR:Trojan-SMS.AndroidOS.Stealer.a<br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/62ec89a0f6c8f6cd047705793a3fc9818adb5c7f3a098d472bc0b0c4c6a4ee03\/analysis\/1386176451\/\"><strong>MD5: 1a2b4d6280bae654ee6b9c8cfe1204ab<\/strong><\/a> &#8211; detected by 4 out of 48 antivirus scanners as Java.SMSSend.780; TROJ_GEN.F47V1117<br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/7bbe99439e2f50e647c9178343af4b2e8ebec4630fd739e38e2f46e1c7e37bac\/analysis\/1386176560\/\"><strong>MD5: 2ff587ffb2913aee16ec5cae7792e2a7<\/strong><\/a> &#8211; detected by 0 out of 48 antivirus scanners<\/p>\n<p><strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot&nbsp;SecureAnywhere<\/a><\/strong>&nbsp;users are proactively protected from these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve just intercepted a currently active malicious campaign, relying on redirectors placed at compromised\/hacked legitimate Web sites, for the purpose of hijacking the legitimate traffic and directly exposing it to multi mobile OS based malicious\/fraudulent content. In this particular case, a bogus &#8220;Browser Update&#8220;, which in reality is a premium rate SMS malware.<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[16349,16321,16311,4811,3871,5257,16469,16749,3721,4065,5717,3523,23141,16751,16747,3919,6835,5721],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15215"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15215"}],"version-history":[{"count":6,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15215\/revisions"}],"predecessor-version":[{"id":32559,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15215\/revisions\/32559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15215"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15215"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}