{"id":15999,"date":"2014-02-14T09:10:51","date_gmt":"2014-02-14T16:10:51","guid":{"rendered":"https://www.webroot.com/blog/?p=15999"},"modified":"2018-01-30T12:21:15","modified_gmt":"2018-01-30T19:21:15","slug":"doubleclick-malvertising-campaign-exposes-long-run-beneath-radar-malvertising-infrastructure","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/02\/14\/doubleclick-malvertising-campaign-exposes-long-run-beneath-radar-malvertising-infrastructure\/","title":{"rendered":"DoubleClick malvertising campaign exposes long-run beneath the radar malvertising infrastructure"},"content":{"rendered":"<p>Today, at 2014-02-12 12:16:20 (CET), we became aware of a possible evasive\/beneath the radar malvertising based g01pack exploit kit attack, taking place through the DoubleClick ad network using an advertisement featured at About.com. \u00a0Investigating further, we were able to identify the actual domains\/IPs involved in the campaign, and perhaps most interestingly, managed to establish a rather interesting connection between the name servers of one of the domains involved\u00a0in the attacks, and what appears to be a fully operational and running Ukrainian-based ad platform, Epom in this particular case.<\/p>\n<p><!--more--><\/p>\n<p><strong>Actual URL:<\/strong> <em>hxxp:\/\/ad.doubleclick.net\/N479\/adi\/abt.education\/education_biology;p=1;svc=;site=biology;t=0;bt=9;bts=0;pc=4;oe=iso-8859-1;auc=1;fd=2;fs=1;sp2=0;go=9;a=;kw=;chan=education;syn=about;tile=1;r=1;dcopt=ist;sz=728&#215;90;u=DBIIS70bOkWAXwch41309;dc_ref=http:\/biology.about.com\/library\/glossary\/bldefmenlawia.htm;ord=1DBIIS70bOkWAXwch41309<\/em><\/p>\n<p><strong>Malvertising domains\/URLs\/IPs involved in the campaign:<\/strong><br \/>\n<strong>adservinghost1.com<\/strong> &#8211; 212.124.112.232; 212.124.112.226 (known to have responded to the same IP is also <strong>cpmservice1.com<\/strong>); 212.124.112.229; 74.50.103.41; 68.233.228.236<br \/>\n<strong>ad.onlineadserv.com<\/strong> &#8211; 37.59.15.44; 37.59.15.211<br \/>\nhxxp:\/\/188.138.90.222\/ad.php?id=31984&amp;cuid=55093&amp;vf=240<\/p>\n<p><strong>IP reconnaissance:<\/strong><br \/>\n188.138.90.222 &#8211; The following domains are also known to have responded to the same IP: <a href=\"http:\/\/www.bluecoat.com\/fr\/node\/7822\"><strong>rimwaserver.com<\/strong><\/a>; <strong>notslead.com<\/strong>; <strong>adwenia.com<\/strong> &#8211; Email: philip.woronoff@yandex.ru (also known to have responded to 188.138.74.38 in the past; as well as\u00a0<strong>digenmedia.com<\/strong>)<\/p>\n<p>Based on <a href=\"http:\/\/www.brightcloud.com\/\"><strong>BrightCloud&#8217;s database<\/strong><\/a>, not only is <strong>adservinghost1.com<\/strong> already flagged as malicious, but also, we&#8217;re aware that <a href=\"https:\/\/www.virustotal.com\/en\/file\/76f5cc93794620c1808077fef71b1a1d43b6b63a5d2b2e62c2f4af60f57f7bbb\/analysis\/\"><strong>MD5: dc35b211b5eb5bd8af02c412e411d40e<\/strong><\/a> (Rogue:Win32\/Winwebsec) is known to have phoned back to the same IP as the actual domain,\u00a0hxxp:\/\/212.124.112.232\/cb_soft.php?q=dcee08c46ea4d86769a92ab67ff5aafa in particular.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/DoubleClick_Malvertising.png\"><img decoding=\"async\" loading=\"lazy\" width=\"703\" height=\"909\" class=\"size-full wp-image-16002 aligncenter\" alt=\"DoubleClick_Malvertising\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/DoubleClick_Malvertising.png\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/DoubleClick_Malvertising.png 703w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/DoubleClick_Malvertising-232x300.png 232w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/p>\n<p><strong>Here comes the interesting part. Apparently, the name servers of adservinghost1.com are currently responding to the same IPs as the name servers of the Epom ad platform.<\/strong><br \/>\nNS1.ADSERVINGHOST1.COM &#8211; 212.124.126.2<br \/>\nNS2.ADSERVINGHOST1.COM &#8211; 74.50.103.38<\/p>\n<p><strong>The following domains are also currently responding to 212.124.126.2, further confirming the connection:<\/strong><br \/>\nns1.epom.com<br \/>\nads.epom.com<br \/>\napi.epom.com<br \/>\ndirectads.epom.com<br \/>\nns1.adshost1.com<br \/>\nns1.adshost2.com<br \/>\nns1.adshost3.com<\/p>\n<p><strong>The following domains are also responding to the same IP as the Epom.com domain at 198.178.124.5:<\/strong><br \/>\nautomob.com<br \/>\nautos.net.ua<br \/>\nepom.com<br \/>\nformanka-masova.cz<br \/>\nipfire.com &#8211; Email: kaandvc@gmail.com; Email: satilikdomain@live.com<br \/>\nsmartkevin.com<\/p>\n<p>We&#8217;ll be keeping an eye on this beneath the radar malvertising infrastructure, and post updates as soon as new developments emerge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, at 2014-02-12 12:16:20 (CET), we became aware of a possible evasive\/beneath the radar malvertising based g01pack exploit kit attack, taking place through the DoubleClick ad network using an advertisement featured at About.com. \u00a0Investigating further, we were able to identify the actual domains\/IPs involved in the campaign, and perhaps most interestingly, managed to establish a [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4037,4051,4031,3881,4033,4039,4045,4053,4023,4043,4047,4041,4035,4027,4049,4025,4021,4019,4029,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15999"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15999"}],"version-history":[{"count":10,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15999\/revisions"}],"predecessor-version":[{"id":16011,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15999\/revisions\/16011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15999"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15999"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}