{"id":3134,"date":"2010-08-06T13:10:03","date_gmt":"2010-08-06T20:10:03","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3134"},"modified":"2018-10-05T14:40:13","modified_gmt":"2018-10-05T20:40:13","slug":"subscription-renewal-spam-points-to-drive-by","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/08\/06\/subscription-renewal-spam-points-to-drive-by\/","title":{"rendered":"Subscription Renewal Spam Points to Drive-by"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2002.png\" alt=\"\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/08\/06\/subscription-renewal-spam-points-to-drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2012.png\" alt=\"Add to Facebook\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;title=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2022.png\" alt=\"Add to Digg\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;title=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2032.png\" alt=\"Add to Del.icio.us\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;title=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2042.png\" alt=\"Add to Stumbleupon\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;title=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2052.png\" alt=\"Add to Reddit\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;Title=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2062.png\" alt=\"Add to Blinklist\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2072.png\" alt=\"Add to Twitter\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2082.png\" alt=\"Add to Technorati\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;t=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2092.png\" alt=\"Add to Furl\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F08%2F06%2Fsubscription-renewal-spam-points-to-drive-by&amp;h=Subscription%20Renewal%20Spam%20Points%20to%20Drive-by\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2102.png\" alt=\"Add to Newsvine\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2112.png\" alt=\"\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3137\" title=\"20100806-bestbuy_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_crop.jpg\" alt=\"\" width=\"330\" height=\"128\" \/><\/a>Dear Customers: Please be aware that a crew of Russian malware distributors are circulating a spam message which looks like a subscription renewal confirmation from Best Buy, allegedly for one of our products.<\/p>\n<p>The linked text in the message, however, leads to a Web site which performs a drive-by download. Please don&#8217;t click the links in the message; If you have any questions about your subscription, please <a href=\"https:\/\/www.webroot.com\/us\/en\/support\/support-home\" target=\"_blank\" rel=\"noopener\">contact support<\/a>.<\/p>\n<p>The spammers appear to have done some homework. Some, but not enough. Best Buy currently <a href=\"http:\/\/www.bestbuy.com\/site\/Brands\/Webroot\/pcmcat166800050087.c?id=pcmcat166800050087\" target=\"_blank\" rel=\"noopener\">sells our products <\/a>through their online software subscription service. Note to spammers: If you&#8217;re going to try to hijack our trademark, the least you could do is <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/av\" target=\"_blank\" rel=\"noopener\">get the name right<\/a>. Best Buy doesn&#8217;t sell anything called <em>Webroot Spysweeper with Antivirus Product<\/em>. Nor do we.<\/p>\n<p>The email message claims it is a notice that your subscription has been renewed, and includes a serial number (which doesn&#8217;t work) and a transaction date of July 17.<\/p>\n<p>The link in the message leads to the Web site of a small bed and breakfast in New Zealand, which has been compromised. We&#8217;ve informed the owners of that Web site of the spam campaign and asked them to take down the page referenced in the spam message.<\/p>\n<p>I guess we struck a nerve, hurt some sensitive malware author&#8217;s <em>pwetty widdle feewings<\/em>, and ended up a target for attack, one that falls down. Too bad, so sad.<\/p>\n<p><!--more--><\/p>\n<p>If you were to click a link, you&#8217;d end up seeing a page that looks like this one.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_xpage.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3140\" title=\"20100806-bestbuy_xpage\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_xpage.jpg\" alt=\"\" width=\"354\" height=\"139\" \/><\/a><\/p>\n<p>The page attempts to do two things: It loads a script that originates from the <strong>yummyeyes.ru<\/strong> domain, and it also forces the browser to open one of those fake Canadian Pharmacy pill-vendor pages, hosted on <strong>spruceteam.com<\/strong>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_xpage_source.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3139\" title=\"20100806-bestbuy_xpage_source\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_xpage_source.jpg?w=300\" alt=\"\" width=\"300\" height=\"55\" \/><\/a><\/p>\n<p>The <em>yummyeyes <\/em>script is <a href=\"http:\/\/wepawet.iseclab.org\/view.php?hash=a237ffa8d4140ea856e10f2e3f1542b9&amp;t=1281104323&amp;type=js\" target=\"_blank\" rel=\"noopener\">doing some bad stuff<\/a>, although for the moment it appears not to be working. It attempts to exploit various vulnerabilities, targeting the Java VM and Adobe Reader. The page pushes down a lot of obfuscated Javascript, as well as a malicious PDF and another page which tries to get Java to load an applet that isn&#8217;t present on the server.<\/p>\n<p>The Javascript, once deobfuscated, reveals how goofy the attackers are. They set a variable with the value of &#8220;3.13.37&#8221; &#8212; seriously.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_31337.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3143\" title=\"20100806-bestbuy_31337\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_31337.jpg\" alt=\"\" width=\"414\" height=\"194\" \/><\/a><\/p>\n<p>While we must admit that this is ever so &#8216;l33t, it also invokes an <strong>ID-10T<\/strong> error, chumps.<\/p>\n<p>We also saw this oddball use of <a href=\"http:\/\/www.pcworld.com\/businesscenter\/article\/198514\/protect_windows_xp_from_zeroday_flaw_in_hcp_protocol.html\" target=\"_blank\" rel=\"noopener\">the &#8220;hcp:\/\/&#8221; protocol vulnerability<\/a>. It&#8217;s not much to look at in its raw state:<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_reverse_javascript_obs.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3144\" title=\"20100806-bestbuy_reverse_javascript_obs_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_reverse_javascript_obs_crop.jpg\" alt=\"\" width=\"301\" height=\"122\" \/><\/a><\/p>\n<p>But the lower part of the script cleans up nicely, once you chop out all the double-hex-encoded punctuation marks. Oh, and what&#8217;s that embedded in the script? A URL that&#8217;s been mirror-flipped so it&#8217;s backwards?<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_reverse_javascript.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3145\" title=\"20100806-bestbuy_reverse_javascript_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/08\/20100806-bestbuy_reverse_javascript_crop.jpg\" alt=\"\" width=\"509\" height=\"113\" \/><\/a><\/p>\n<p><em>Nobody <\/em>would have ever spotted that one, pointing to <strong>blockoctopus.ru<\/strong> in a million years. And by nobody, I mean <em>everybody<\/em>. Just another example of <em>elite <\/em>coding skills wasted on halfwitted attempts at crime.<\/p>\n<p>We&#8217;re in the process of retrieving samples, which appear to be your typical rogue antivirus product. Our next definition update will block the domains involved in the attack and their payloads.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" alt=\"wordpress blog stats\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dear Customers: Please be aware that a crew of Russian malware distributors are circulating a spam message which looks like a subscription renewal confirmation from Best Buy, allegedly for one of our products. The linked text in the message, however, leads to a Web site which performs a drive-by download. Please don&#8217;t click the links [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5635,3563,7689,7709,7713,4215,4559,4797,4289,3477,4431,3919,4483,3895,4371,3675,7323,7711,4313,4621],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3134"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3134"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3134\/revisions"}],"predecessor-version":[{"id":25965,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3134\/revisions\/25965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3134"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3134"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}