{"id":4698,"date":"2011-07-20T11:21:09","date_gmt":"2011-07-20T18:21:09","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4698"},"modified":"2024-01-24T14:04:14","modified_gmt":"2024-01-24T21:04:14","slug":"criminals-abuse-amazon-hosting-with-rogues-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/07\/20\/criminals-abuse-amazon-hosting-with-rogues-ransomware\/","title":{"rendered":"Criminals Abuse Amazon Hosting with Rogues, Ransomware"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2004.png\" alt=\"\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/07\/19\/criminals-abuse-amazon-hosting-with-rogues-ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2014.png\" alt=\"Add to Facebook\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;title=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2024.png\" alt=\"Add to Digg\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;title=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2034.png\" alt=\"Add to Del.icio.us\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;title=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2044.png\" alt=\"Add to Stumbleupon\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;title=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2054.png\" alt=\"Add to Reddit\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;Title=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2064.png\" alt=\"Add to Blinklist\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ra+%40+Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2074.png\" alt=\"Add to Twitter\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/07\/19\/criminals-abuse-amazon-hosting-with-rogues-ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2084.png\" alt=\"Add to Technorati\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;headline=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2094.png\" alt=\"Add to Yahoo Buzz\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F07%2F19%2Fcriminals-abuse-amazon-hosting-with-rogues-ransomware&amp;h=Criminals%20Abuse%20Amazon%20Hosting%20with%20Rogues%2C%20Ransomware\" target=\"_blank\" rel=\"nofollow noopener\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2104.png\" alt=\"Add to Newsvine\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2010\/08\/gs2114.png\" alt=\"\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_amazonnetworktraffic.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-4704 alignleft\" title=\"20110719_rogue_amazonnetworktraffic_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_amazonnetworktraffic_crop.png\" alt=\"\" width=\"308\" height=\"88\" \/><\/a>The criminals who push rogues at the world don&#8217;t really care about the reputations of the ISPs or Web hosting services they abuse. They leap from free service to free service until they&#8217;ve thoroughly worn out their welcome and, in some cases, destroyed the reputation of the service they abused. But they have behaved in one predictable way over the years: They&#8217;re stingy, and won&#8217;t pay for anything unless it&#8217;s absolutely necessary, despite the fact that they&#8217;re raking in cash by the boatload.<\/p>\n<p>But that seemed to change this week when we saw a number of Web sites pop up on the radar. The sites employ the now well-worn scam of pretending to be some sort of video streaming service. In this case, they pretended to be a porn site, but the most surprising part was not what was hosted, but where: Amazon&#8217;s Cloudfront hosting service ended up, temporarily for a few hours, serving up malicious Web pages. Amazingly, it seems they actually paid for hosting instead of just stealing it.<\/p>\n<p>Amazon shut the sites down quickly, but before they did, we visited one site called <strong>xrvid-porno.com<\/strong>. The page<em> isn&#8217;t exactly family friendly<\/em>, but the gist of the scam is that <em>that<\/em> page eventually redirected the browser to a server inside of Amazon&#8217;s cloud hosting service, and that&#8217;s where the trouble began.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_networktraffic_domains.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4708\" title=\"20110719_rogue_networktraffic_domains-crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_networktraffic_domains-crop.png\" alt=\"\" width=\"294\" height=\"142\" \/><\/a><\/p>\n<p>The Amazon-hosted page was located on a server in a colocation facility in Dallas-Fort Worth, Texas, but the pages themselves were written in Russian, which indicates that these scammers (who have been based in Russia for some time) are turning on their own countrymen to advance their criminal enterprise. With the help of a free Web proxy, I made the browser on my test system appear to come from a Russian IP address, and in return, the Web site delivered a series of exploit files which eventually resulted in the computer becoming infected with a rogue.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_domain-courtesy-of-robtex-com.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4706\" title=\"20110719_rogue_domain-courtesy-of-robtex.com_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_domain-courtesy-of-robtex-com_crop.png\" alt=\"\" width=\"324\" height=\"78\" \/><\/a><\/p>\n<p>None of the really malicious code or content was actually hosted within Amazon&#8217;s servers. Instead, the fake porno site, hosted on Amazon, called scripts from another server which was actually located in the network belonging to <strong>Latvenergo<\/strong>, the Latvian national energy company. The domain from which the malicious scripts originated, <strong>79kjs.ru<\/strong>, points to an IP address inside of Latvenergo&#8217;s network, and remains active and serving malware as I write this.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_icons.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4709\" title=\"20110719_rogue_icons\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_icons.png\" alt=\"\" width=\"138\" height=\"65\" \/><\/a><\/p>\n<p>Those scripts included one of the many varieties of browser exploit kits, and the exploit kit which ran decided that the most efficient method of infecting my test machine was to push down malicious PDF files to the browser, though it also tried a number of other browser exploits before settling on this one.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_ransomware-dl.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4712\" title=\"20110719_rogue_ransomware-dl\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_ransomware-dl.png\" alt=\"\" width=\"397\" height=\"64\" \/><\/a><\/p>\n<p>Those PDFs, running in an older, more vulnerable version of the Adobe Acrobat Reader, contained just enough scripted code to force the browser to yet another IP address, physically hosted in the Netherlands, where the rogue application was hosted. The file which came down the pipe calls itself <strong>XP Security 2012.<\/strong><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_xp-security-2012.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4729\" title=\"20110719_rogue_xp-security-2012\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_xp-security-2012.png?w=300\" alt=\"\" width=\"300\" height=\"236\" \/><\/a><\/p>\n<p>It also brought along a friend: A ransomware application which hijacks the desktop with an all-black screen (hiding the desktop icons), kills Explorer, and makes a demand for payment of 500 rubles in a window that looks like a Windows BSOD screen.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_ransomscreen.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-4711 alignnone\" title=\"20110719_rogue_ransomscreen_crop\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/07\/20110719_rogue_ransomscreen_crop.png\" alt=\"\" width=\"647\" height=\"168\" \/><\/a><\/p>\n<p>The best part of this ransomware &#8220;warning message&#8221; is its internal contradiction. Roughly translated, the message threatens (emphasis mine):<\/p>\n<blockquote>\n<h4 style=\"text-align: left;\">Computer is Blocked!<\/h4>\n<p>Your computer is blocked for viewing, copying and<br \/>\ndissemination of video materials containing elements of pedophilia<br \/>\nand rape of children. In order to remove the block You are required to<br \/>\npay a fine in the amount of 500 rubles to the (telephone) number<br \/>\n8-965-265-90-84. In case of payment of the sum equal to or<br \/>\ngreater the amount fine there will be an unblock code on the receipt.<br \/>\nYou&#8217;ll need to enter the code in the lower portion of the window and<br \/>\npress the &#8220;unblock&#8221; button. Once the block is removed you<br \/>\nmust delete all materials containing elements of rape and<br \/>\npedophilia. If you do not pay the fine within 12 hours, <strong>all <\/strong><br \/>\n<strong>information on your personal computer will be permanently <\/strong><br \/>\n<strong>deleted<\/strong> <strong>and<\/strong> the case will be <strong>sent to court for investigation<\/strong> in accordance to<br \/>\nchapter 242 part 1 of the Penal Code of Russian Federation.<\/p>\n<p>Rebooting or turning off of the computer will lead to<br \/>\nprompt removal of all data,<strong> including the<\/strong><br \/>\n<strong>operating system <em>and BIOS<\/em><\/strong>, without ability of further<br \/>\nrestoration.<\/p><\/blockquote>\n<p>Wow, really? You&#8217;re going to delete the evidence, then send the case in for prosecution? I don&#8217;t know anything about Russian Federation cybercrime law, but if I had been committing a crime, that sounds pretty good to me. Bring it on! Also, I&#8217;d like to see you try to wipe the BIOS out of its firmware hidey-hole. The only thing they didn&#8217;t threaten their software would do was remove all the screws from the PC. As Bugs Bunny might say, <em>what a maroon!<\/em><\/p>\n<p>Fortunately for me, I had Process Explorer running in the background, and could alt-tab to that task manager-like tool (which the ransomware had simply shoved into the background) and kill the ransomware process.<\/p>\n<p>Amazon should be credited with shutting down the site within just a few hours of it appearing online, but the entire incident stands as a cautionary tale to Web hosting providers or ISPs: No matter how large you are, you&#8217;re not invulnerable to the threat of malware distributors abusing your service.<\/p>\n<p><em>(Thanks to Timur Kovalev on the Threat Research dev team for the ransomware translation)<\/em><a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" alt=\"Webroot blog stats\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The criminals who push rogues at the world don&#8217;t really care about the reputations of the ISPs or Web hosting services they abuse. They leap from free service to free service until they&#8217;ve thoroughly worn out their welcome and, in some cases, destroyed the reputation of the service they abused. But they have behaved in [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[8755,4471,5137,3453,8759,5297,8751,7337,6643,8753,4531,4065,8749,3937,4157,8757,3947,4371,4313,4641],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4698"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4698"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4698\/revisions"}],"predecessor-version":[{"id":32613,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4698\/revisions\/32613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4698"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4698"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}