{"id":16013,"date":"2014-02-18T14:51:41","date_gmt":"2014-02-18T21:51:41","guid":{"rendered":"https://www.webroot.com/blog/?p=16013"},"modified":"2023-12-08T07:36:04","modified_gmt":"2023-12-08T14:36:04","slug":"spamvertised-image-sent-evernote-themed-campaign-serves-client-side-exploits","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/02\/18\/spamvertised-image-sent-evernote-themed-campaign-serves-client-side-exploits\/","title":{"rendered":"Spamvertised &#8216;Image has been sent&#8217; Evernote themed campaign serves client-side exploits"},"content":{"rendered":"<p>Cybercriminals continue to populate their botnets,\u00a0with new infected hosts, through the persistent and systematic spamvertising of tens of thousands of fake emails which impersonate popular and well known brands &#8211; all in an attempt to socially engineer prospective victims into interacting with the scam.<\/p>\n<p>We&#8217;ve recently intercepted a currently circulating malicious spam campaign, impersonating Evernote, serving client-side exploits to prospective victims who click on the links found in the fake emails.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Evernote_Malware_Malicious_Software_Client_Side_Exploits_Spam_Spamvertised.png\"><img decoding=\"async\" loading=\"lazy\" width=\"368\" height=\"124\" class=\"size-full wp-image-16015 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Evernote_Malware_Malicious_Software_Client_Side_Exploits_Spam_Spamvertised.png\" alt=\"Evernote_Malware_Malicious_Software_Client_Side_Exploits_Spam_Spamvertised\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Evernote_Malware_Malicious_Software_Client_Side_Exploits_Spam_Spamvertised.png 368w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Evernote_Malware_Malicious_Software_Client_Side_Exploits_Spam_Spamvertised-300x101.png 300w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><\/a><\/p>\n<p><strong>Sample redirection chain:<\/strong> <em>hxxp:\/\/nortonfire.co.uk\/1.html<\/em> (82.165.213.55) -&gt; <em>hxxp:\/\/merdekapalace.com\/1.txt<\/em> &#8211; 202.71.103.21 -&gt; <em>hxxp:\/\/www.shivammehta.com\/1.txt<\/em> &#8211; 181.224.129.14 -&gt; <em>hxxp:\/\/ypawhygrawhorsemto.ru:8080\/z4ql9huka0<\/em><\/p>\n<p><strong>Domain name reconnaissance for the fast-fluxed ypawhygrawhorsemto.ru:<\/strong><br \/>\n37.59.36.223<br \/>\n180.244.28.149<br \/>\n140.112.31.129<br \/>\n31.222.178.84<br \/>\n54.254.203.163<br \/>\n78.108.93.186<br \/>\n202.22.156.178<br \/>\n54.254.203.163<br \/>\n78.108.93.186<br \/>\n140.112.31.129<br \/>\n202.22.156.178<br \/>\n31.222.178.84<br \/>\n37.59.36.223<br \/>\n180.244.28.149<\/p>\n<p><strong>Responding to 78.108.93.186, are also the following malicious domains:<\/strong><br \/>\nypawhygrawhorsemto.ru &#8211; 78.108.93.186<br \/>\njolygoestobeinvester.ru &#8211; 78.108.93.186<br \/>\nafrikanajirafselefant.biz &#8211; 78.108.93.186<br \/>\nbakrymseeculsoxeju.ru &#8211; 78.108.93.186<br \/>\nozimtickugryssytchook.org &#8211; 78.108.93.186<br \/>\nbydseekampoojopoopuboo.biz &#8211; 78.108.93.186<\/p>\n<p><strong>Name servers used in the campaign:<\/strong><br \/>\nName server: ns1.ypawhygrawhorsemto.ru &#8211; 173.255.243.199<br \/>\nName server: ns2.ypawhygrawhorsemto.ru &#8211; 119.226.4.149<br \/>\nName server: ns3.ypawhygrawhorsemto.ru &#8211; 192.237.247.65<br \/>\nName server: ns4.ypawhygrawhorsemto.ru &#8211; 204.232.208.115<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p><strong>Second sample redirection chain:<\/strong> <em>hxxp:\/\/www.smithpointarchery.com\/1.html<\/em> &#8211; 65.61.11.74 -&gt; <em>hxxp:\/\/merdekapalace.com\/1.txt<\/em> &#8211; 202.71.103.21 -&gt; <em>hxxp:\/\/www.shivammehta.com\/1.txt<\/em> &#8211; 181.224.129.14 -&gt; <em>hxxp:\/\/opheevipshoopsimemu.ru:8080\/dp2w4dvhe2<\/em> &#8211; 31.222.178.84<\/p>\n<p><strong>Detection rate for a sample served client-side exploit:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/c8e571de80affa42d3d062ba387a9d14716e869a9826e1048cdf17cc98771e46\/analysis\/\"><strong>MD5: c81b2b9fbee87c6962299f066b983a46\u00a0<\/strong><\/a><\/p>\n<p><strong>Domain name reconnaissance for the fast-fluxed opheevipshoopsimemu.ru:<\/strong><br \/>\n31.222.178.84<br \/>\n180.244.28.149<br \/>\n78.108.93.186<br \/>\n140.112.31.129<br \/>\n78.129.184.4<br \/>\n54.254.203.163<br \/>\n202.22.156.178<br \/>\n37.59.36.223<\/p>\n<p><strong>Name servers part of the campaign&#8217;s infrastructure:<\/strong><br \/>\nName server: ns1.opheevipshoopsimemu.ru. 173.255.243.199<br \/>\nName server: ns2.opheevipshoopsimemu.ru. 119.226.4.149<br \/>\nName server: ns3.opheevipshoopsimemu.ru. 192.237.247.65<br \/>\nName server: ns4.opheevipshoopsimemu.ru. 204.232.208.115<\/p>\n<p><strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot\u00a0SecureAnywhere<\/a><\/strong>\u00a0users are proactively protected from these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals continue to populate their botnets,\u00a0with new infected hosts, through the persistent and systematic spamvertising of tens of thousands of fake emails which impersonate popular and well known brands &#8211; all in an attempt to socially engineer prospective victims into interacting with the scam. We&#8217;ve recently intercepted a currently circulating malicious spam campaign, impersonating Evernote, [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[23159,23155,23161,23163,23157,17177,16183,23165,23153,17175,17181,17179,17185,17183,14051],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16013"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16013"}],"version-history":[{"count":11,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16013\/revisions"}],"predecessor-version":[{"id":32485,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16013\/revisions\/32485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16013"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16013"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}