{"id":2882,"date":"2010-06-24T22:26:35","date_gmt":"2010-06-25T05:26:35","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2882"},"modified":"2018-01-30T11:09:39","modified_gmt":"2018-01-30T18:09:39","slug":"omg-vuvuzela-banned-tweets-infect-followers","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/06\/24\/omg-vuvuzela-banned-tweets-infect-followers\/","title":{"rendered":"&#8220;OMG! Vuvuzela banned!&#8221; Tweets Infect Followers"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2002.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/06\/24\/omg-vuvuzela-banned-tweets-infect-followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2012.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;title=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2022.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;title=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2032.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;title=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2042.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;title=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2052.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;Title=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2062.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2072.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2082.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;t=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2092.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F24%2Fomg-vuvuzela-banned-tweets-infect-followers&amp;h=%22OMG!%20Vuvuzela%20banned!%22%20Tweets%20Infect%20Followers\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2102.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2112.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_tweet.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2886\" title=\"20100624_vuvu_tweet_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_tweet_crop.jpg\" width=\"376\" height=\"83\" \/><\/a>Malware authors must have a soft spot in their hearts for the long-maligned South African vuvuzela, because once again, the\u00a0 most annoying noisemaker in World Cup history is driving people to Web sites which push infections down to their computers. This time, people are retweeting the malicious links attached to a message that reads &#8220;<strong>OMG! Vuvuzela banned!<\/strong>&#8221; along with the hashtags <strong>#worldcup<\/strong> and <strong>#vuvuzelabanned<\/strong>. At last check in Google, references to the malicious links number over 16,000.<\/p>\n<p>The tweets use a variety of different link shortening services (including <strong>bit.ly<\/strong>,<strong> tinyurl.com<\/strong>, <strong>is.gd<\/strong>, and <strong>dr.tl<\/strong>) to mask the fact that their destination is actually a bogus image hosting website hosted on the <strong>.in<\/strong> top-level domain (supposedly used by Web sites registered in the country of India, but these sites are all hosted elsewhere). The Web site you eventually land on calls itself <strong>Image Sheep<\/strong>, while in the background, your PC is being herded into a botnet.<\/p>\n<p>As an aside, there is a real image hosting service by the same name, but <a href=\"http:\/\/www.robtex.com\/dns\/imagesheep.com.html#whois\" target=\"_blank\">the real Image Sheep is registered elsewhere<\/a> and hosted in an entirely different network than these fake Image Sheep clones.<\/p>\n<p>Once the victim&#8217;s browser loads the fake Image Sheep page, it pushes a Java &#8220;image viewer&#8221; applet, named <strong>target.jar<\/strong>, down to the browser. It&#8217;s easy to pick apart the contents of this file, which contains additional Java applets and PHP scripts that push the malicious file (named <strong>IMG12523.jpg.exe<\/strong>) down to the victim&#8217;s computer. The file itself is a downloader component of an adversary we&#8217;ve seen before:<strong> Trojan-Backdoor-Protard<\/strong> (aka <strong>Gootkit<\/strong>), which retrieves additional malware and retrieves complex instructions.<\/p>\n<p><!--more--><\/p>\n<p>As we&#8217;ve seen in our earlier Protard infections, the malware distributors behind Protard write small, simplistic malware executables, and use complex Web based scripting as instructions, to control the malware&#8217;s behavior. That seems to be the case in this instance, as well.<\/p>\n<p>Once executed, the initial payload begins a process where it downloads\u00a0 several payloads, including the pernicious adware known as <strong>Virtumonde<\/strong>, from <strong>bts.microsoftupdateserver.org<\/strong>, a site hosted in Russia. Some of those payloads are downloaders, as well.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_bts.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-2897\" title=\"20100624_vuvu_bts\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_bts.jpg?w=300\" width=\"300\" height=\"37\" \/><\/a><\/p>\n<p>The file then receives batches of 25 stolen credentials, in the forms of email addresses and passwords, from the command and control server&#8230;<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_facebook_credentials.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2902\" title=\"20100624_vuvu_facebook_credentials_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_facebook_credentials_crop1.jpg\" width=\"275\" height=\"96\" \/><\/a><\/p>\n<p>&#8230;and with those credentials, the tool begins to attempt to log into <strong>Twitter, MySpace,<\/strong> and<strong> Facebook<\/strong>, methodically testing each email\/password combination to see if it successfully logs into the service, as shown in this screen taken from a packet capturing tool.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_credcheck.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2904\" title=\"20100624_vuvu_credcheck_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_credcheck_crop.jpg\" width=\"159\" height=\"176\" \/><\/a><\/p>\n<p>This behavior is similar to how the spy tested stolen FTP credentials <a href=\"http:\/\/blog.webroot.com\/2010\/02\/26\/botnet-trojan-adds-gootkit-code-to-web-pages\/\" target=\"_blank\">the last time we looked at it<\/a>.<\/p>\n<p>The JAR file that&#8217;s used to draw down the initial infection also contains scripting that adds an entry with details about the victim&#8217;s computer into a MySQL database running on the malicious web server. Looking at the SQL commands in use in the script, it&#8217;s clear the malware distributors are closely monitoring the effectiveness of the infection: It&#8217;s reporting back the number of infected users, the rate at which people infect themselves, and the clicks to various parts of the page.<\/p>\n<p>Oh yeah, and this is where the plain old &#8216;tard meets the <em>Protard<\/em>: They&#8217;ve left their SQL server root password blank. Thanks, fellas.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_malware_reference.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2895\" title=\"20100624_vuvu_malware_reference\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_malware_reference.jpg\" width=\"412\" height=\"356\" \/><\/a><\/p>\n<p>That&#8217;s important because, at last check, the malware distributors have registered only a small number of sites, but are using lots of different shortened URLs to link to those sites.<\/p>\n<p>In addition, the WHOIS information for the domains used to host the fake Image Sheep pages all reference the word <strong>godsname<\/strong> as the Registrant Organization.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_domainwhois.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2893\" title=\"20100624_vuvu_domainwhois_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_domainwhois_crop.jpg\" width=\"330\" height=\"222\" \/><\/a><\/p>\n<p>The Protard malware file&#8217;s properties refer to the Product Name of the malware as <strong>godsname2<\/strong>, which probably isn&#8217;t a coincidence.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_malware_properties.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2891\" title=\"20100624_vuvu_malware_properties_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100624_vuvu_malware_properties_crop.jpg\" width=\"243\" height=\"128\" \/><\/a><\/p>\n<p>Bottom line, don&#8217;t click the malicious shortlinks in these tweets, and make sure your browser and the Java plug-in installed on your computer are both up to date. We&#8217;re blocking the domains involved in the attack, and our customers can expect that we&#8217;ll have added detections for the malware to our next definition release.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware authors must have a soft spot in their hearts for the long-maligned South African vuvuzela, because once again, the\u00a0 most annoying noisemaker in World Cup history is driving people to Web sites which push infections down to their computers. This time, people are retweeting the malicious links attached to a message that reads &#8220;OMG! [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[7559,7555,3619,7337,7107,7563,7557,4065,6609,3477,4909,7565,4681,7567,4167,3471,4225,7561,4313,6089],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2882"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2882"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2882\/revisions"}],"predecessor-version":[{"id":23552,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2882\/revisions\/23552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2882"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2882"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}