{"id":2429,"date":"2010-03-22T05:01:28","date_gmt":"2010-03-22T12:01:28","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2429"},"modified":"2024-01-24T13:31:34","modified_gmt":"2024-01-24T20:31:34","slug":"pushu-variant-spams-hotmail-cracks-audio-captchas","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/03\/22\/pushu-variant-spams-hotmail-cracks-audio-captchas\/","title":{"rendered":"Pushu Variant Spams Hotmail, Cracks Audio Captchas"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2001.png\"><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/03\/22\/pushu-variant-spams-hotmail-cracks-audio-captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2011.png\"><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;title=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2021.png\"><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;title=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2031.png\"><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;title=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2041.png\"><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;title=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2051.png\"><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;Title=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2061.png\"><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2071.png\"><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2081.png\"><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;t=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2091.png\"><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F03%2F22%2Fpushu-variant-spams-hotmail-cracks-audio-captchas&amp;h=Pushu%20Variant%20Spams%20Hotmail%2C%20Cracks%20Audio%20Captchas\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2101.png\"><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2111.png\"><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-audiocap_crop.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2439\" title=\"20100322-pushu-audiocap_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-audiocap_crop.jpg\" width=\"274\" height=\"163\"><\/a>A new version of <strong>Trojan-Pushu<\/strong> is doing some interesting stuff to bypass captchas used by Microsoft&#8217;s Hotmail\/Live.com\/MSN webmail services in order to spam people with links to malicious Yahoo Groups pages.<\/p>\n<p>The three-year-old spy (known by a variety of other aliases, including <em>Cutwail, Pushdo, Diehard<\/em>, and <em>Rabbit<\/em>) has always been, primarily, a spam bot. In this case, however, the spy is not sending spam by connecting to open mail relays or more traditional means; It&#8217;s spamming through the Hotmail\/Live.com Web mail interface. Most interestingly, during the course of the spam sessions, the spy apparently pulls down &#8220;audio captchas&#8221; and successfully sends back the correct response, which permits it to continue spamming.<\/p>\n<p>Audio captchas are just what they sound like they are: A voice, often female, reads a sequence of 10 numbers in an artificially noisy background. The purpose is simple: to ensure that a human being, and not some automated process, is entering data into a form. Just as you would type in the scrambled-up letters from a captcha image to proceed, with an audio captcha you have to type the correct numbers from the recording, or the site won&#8217;t let you continue.<\/p>\n<p>That doesn&#8217;t seem to be a problem for this Pushu variant. We&#8217;ve seen Trojans attempt to crack visual captchas a number of ways, including using optical character recognition; employing a <a href=\"http:\/\/en.wikipedia.org\/wiki\/The_Turk\" target=\"_blank\" rel=\"noopener\">mechanical turk<\/a> service (where humans are paid fractions of a penny for each correctly entered captcha); or by prompting the victim him- or herself to enter captcha text, disguising the captcha form as some sort of Windows prompt. This is the first time I&#8217;ve heard of a Trojan attempt to crack the audio captcha, let alone succeed.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-keepassprop.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2440\" title=\"20100322-pushu-keepassprop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-keepassprop.jpg\" width=\"298\" height=\"215\"><\/a><\/p>\n<p>The sample we saw uses both the icon and the file properties of the free password manager application <strong>KeePass<\/strong>. But this is no password manager. Within about five seconds of execution, the application moved a copy of itself, named<strong> reader_s.exe<\/strong>, into the system32 folder and began making network connections.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-spamcontents.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2441\" title=\"20100322-pushu-spamcontents\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-spamcontents.jpg\" width=\"493\" height=\"88\"><\/a><\/p>\n<p>Initially, the file contacted four computers over the Internet that acted as command-and-control servers. Three of the four IP addresses were already on several blacklists; the fourth is a member of a range of IP addresses known to have been used in the past by the infamous Russian Business Network to engage in exactly these kinds of shenanigans. The Trojan retrieved instructions, and didn&#8217;t contact the CnC servers again. It began spamming less than three minutes after it was executed, and began querying for its first audio captcha almost a minute later.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-hipaudiofiles.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2443\" title=\"20100322-pushu-hipaudiofiles_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-hipaudiofiles_crop.jpg\" width=\"226\" height=\"198\"><\/a><\/p>\n<p>In the case of Hotmail\/Live.com, the audio captcha files are small WAV audio files with the file name <strong>hipaudio.srf<\/strong>. Listening to them forces you to concentrate, because the numbers are awash in noise, almost as if someone was reading them over the PA system in a noisy airport terminal. The cryptic messages are more reminiscent of the old, cold war-era <a href=\"http:\/\/en.wikipedia.org\/wiki\/Numbers_station\" target=\"_blank\" rel=\"noopener\">shortwave radio number stations<\/a> reputedly used by spy agencies.<\/p>\n<p>In our tests of the samples we collected, the Trojan is able to send spam messages for a period of time before Live.com prompts the bot with a captcha form; The bot retrieves one of these WAV files from Microsoft&#8217;s servers, then returns an answer to the server after a pause of from three to ten seconds.<\/p>\n<p>In one seven minute test period where I permitted the bot to operate freely, the bot demonstrated remarkable capability to bypass the audio captchas. In most cases, it was able to submit the correct answer within two tries, though in one instance, the bot tried six times before it could proceed, and once it gave the correct answer the first time. Once it submits the correct answer, the bot resumes sending its spam. In addition, the bot periodically logs out, then logs back in using a different user account, indicating that the operators of this botnet are trying to fly beneath the radar.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-hipanswerentry.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2445\" title=\"20100322-pushu-hipanswerentry\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-hipanswerentry.jpg\" width=\"342\" height=\"70\"><\/a><\/p>\n<p>The spam emails themselves are short, written by someone who doesn&#8217;t have a strong grasp of English grammar. That&#8217;s putting it mildly, because they are hilariously bad. They&#8217;re just a line of text with a link to a Yahoo Groups page that looks like: <strong>http:\/\/groups.yahoo.com\/group\/(random ten-letter name)\/message\/1<\/strong><\/p>\n<p>The messages resemble somewhat ham-handed social engineering. Here&#8217;s a selection of some of the pickup lines we saw the <em>lounge lizard<\/em> use. I leave it as an exercise to the reader to make a determination as to how effective these would be.<\/p>\n<blockquote><p>God bless you my son. He wants you to look this hot photos right now!<br \/>\nThe old friend of mine. You are looking so manhood on your delineations.<br \/>\nMamma mia! your grandmother is doing so strange things here! Look at these delineations!<br \/>\nHow could we be so stupid when we were foting our action at the love making time? Look Here!<br \/>\nBecome more emancipated man with the most pretty girls of our site.<br \/>\nYou look good in black and white photos. Keep posting such photos on facebook.<br \/>\nAre you fond of the girls you are looking at? Stop looking and take them.<br \/>\nHow many hours did you spend out? You look very fit in your new pictures brother.<br \/>\nStop talking about &#8220;this&#8221;. Visit our site and do not worry.<br \/>\nNothing can be better than meeting a nice young girl and making love with her at night.<br \/>\nIs it really your photo? I do not believe in it! Prove it to me!<\/p><\/blockquote>\n<p>The Yahoo Groups pages changed every few hours. They all link back to something that calls itself the <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-spammedpage.jpg\" target=\"_blank\" rel=\"noopener\">Hacked Blackbook<\/a>, which claims that its pornographic pictures originate from hacked social network accounts.Apparently, it&#8217;s a &#8220;free signup&#8221; but you have to provide a bunch of personal and credit card details in order to do so. Yeah, I see what you did there, fraud guy.<\/p>\n<p>Reliable sources who wish to remain nameless inform me that the photos posted on these spamvertised websites are actually amateur porn models and don&#8217;t come from &#8220;hacked profiles from Facebook, Myspace, Twitter &amp; Flickr&#8221; as the spam ads claim.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-yahoogroup.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2444\" title=\"20100322-pushu-yahoogroup\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/03\/20100322-pushu-yahoogroup.jpg\" width=\"678\" height=\"388\"><\/a><\/p>\n<p>Fortunately for our customers, Pushu is fairly rudimentary to find and remove. Without adding any additional detection, we were able to knock out this sample. Now that&#8217;s what I call <em>looking manhood on your delineations<\/em>!<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new version of Trojan-Pushu is doing some interesting stuff to bypass captchas used by Microsoft&#8217;s Hotmail\/Live.com\/MSN webmail services in order to spam people with links to malicious Yahoo Groups pages. The three-year-old spy (known by a variety of other aliases, including Cutwail, Pushdo, Diehard, and Rabbit) has always been, primarily, a spam bot. In [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[7255,7257,7245,7251,7265,4875,7261,7269,7271,7253,7267,7259,7263,4487,7247,6265,3675,10389,7249,7243],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2429"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2429"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2429\/revisions"}],"predecessor-version":[{"id":32597,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2429\/revisions\/32597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2429"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2429"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}