{"id":7738,"date":"2012-07-27T09:41:17","date_gmt":"2012-07-27T16:41:17","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=7738"},"modified":"2018-10-05T11:13:41","modified_gmt":"2018-10-05T17:13:41","slug":"cybercriminals-target-twitter-spread-thousands-of-exploits-and-malware-serving-tweets","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/07\/27\/cybercriminals-target-twitter-spread-thousands-of-exploits-and-malware-serving-tweets\/","title":{"rendered":"Cybercriminals target Twitter, spread thousands of exploits and malware serving tweets"},"content":{"rendered":"<p>Twitter users, beware!<\/p>\n<p>Over the past several days, cybercriminals have been persistently spamvertising thousands of exploits and malware serving links across the most popular micro blogging service. Upon clicking on the clicks, users are exposed to the exploits served by the Black Hole web malware exploitation kit.<\/p>\n<p>What&#8217;s so special about this campaign? What&#8217;s the detection rate of the malware it drops? Where does it phone back once it&#8217;s executed? Have we seen additional malware phone back to the same command and control servers, indication a connection between these campaigns? Let&#8217;s find out.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Screenshot of a sample automatically registered account spamvertising malicious links to thousands of Twitter users:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7739\" title=\"Twitter_exploits_malware_blackhole_exploit_kit\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit.png\" alt=\"\" width=\"515\" height=\"391\" \/><\/a><\/p>\n<p><strong>Next to English-speaking users, the campaign is also targeting Russian users since July, 23th, 2012:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7741\" title=\"Twitter_exploits_malware_blackhole_exploit_kit_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit_01.png\" alt=\"\" width=\"308\" height=\"172\" \/><\/a><\/p>\n<p>The cybercriminals behind the campaign are also using a publicly available counter to measure the success of the campaign:<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7742\" title=\"Twitter_exploits_malware_blackhole_exploit_kit_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/07\/twitter_exploits_malware_blackhole_exploit_kit_02.png\" alt=\"\" width=\"511\" height=\"95\" \/><\/a><\/p>\n<p>The campaign is currently propagating in the following way &#8211; an automatically generated subdomain is spamvertised with an .html link consisting of the name of the prospective victim. The cybercriminals behind the campaign are harvesting Twitter user names, then automatically generating the username.html files. \u00a0For the time being, they&#8217;re only relying on two static propagation messages, namely, &#8220;<em>It&#8217;s about \u0443ou?<\/em>&#8221; and &#8220;<em>It&#8217;s \u0443ou \u043en photo?<\/em>&#8220;.<\/p>\n<p><strong>Sample malicious URLs spamvertised across Twitter using multiple automatically registered accounts:<\/strong><br \/>\n<em>hxxp:\/\/avril0014.narod.ru\/#dancing_4_1D.html<\/em><br \/>\n<em>hxxp:\/\/vladim-vasiliev.narod2.ru\/#dancingSULKIN.html<\/em><br \/>\n<em>hxxp:\/\/467777.ru\/media\/#dancingKiin.html<\/em><br \/>\n<em>hxxp:\/\/school13spb.ru\/cli\/#dancinemms.html<\/em><br \/>\n<em>hxxp:\/\/daykiri91.narod2.ru\/#dancinela.html<\/em><br \/>\n<em>hxxp:\/\/delfina-200.narod2.ru\/#dancineasy.html<\/em><br \/>\n<em>hxxp:\/\/bumer574.narod.ru\/#dancindung.html<\/em><br \/>\n<em>hxxp:\/\/dfk-kazan.narod2.ru\/#dancinbranson.html<\/em><br \/>\n<em>hxxp:\/\/zaits-oleg.narod.ru\/#dancinbranflake.html<\/em><br \/>\n<em>hxxp:\/\/dimdj.narod.ru\/#dancinbraceface.html<\/em><br \/>\n<em>hxxp:\/\/ohgospodi.narod2.ru\/#dancin_nancy.html<\/em><br \/>\n<em>hxxp:\/\/cazakow-j.narod2.ru\/#dancin_gurrl22.html<\/em><br \/>\n<em>hxxp:\/\/wlad-07.narod2.ru\/#dancin_bearette.html<\/em><br \/>\n<em>hxxp:\/\/v1279610.narod2.ru\/#dancin_4STACKS.html<\/em><br \/>\n<em>hxxp:\/\/school13spb.ru\/cli\/#dancidaT.html<\/em><br \/>\n<em>hxxp:\/\/467777.ru\/media\/#danciareading.html<\/em><br \/>\n<em>hxxp:\/\/school13spb.ru\/cli\/#danchy_xoxo.html<\/em><br \/>\n<em>hxxp:\/\/orlov-tema150894.narod2.ru\/#danchovy.html<\/em><br \/>\n<em>hxxp:\/\/cabfare.narod.ru\/#borkborkpanda.html<\/em><br \/>\n<em>hxxp:\/\/mechta24.narod2.ru\/#borkatochter.html<\/em><br \/>\n<em>hxxp:\/\/dema-zyab.narod.ru\/#borka_ns.html<\/em><br \/>\n<em>hxxp:\/\/denrzn.narod2.ru\/#borka26.html<\/em><br \/>\n<em>hxxp:\/\/arfina2003.narod2.ru\/#bork90.html<\/em><br \/>\n<em>hxxp:\/\/school13spb.ru\/cli\/#borjius55.html<\/em><br \/>\n<em>hxxp:\/\/zyyyz92.narod2.ru\/#borjitamr7.html<\/em><br \/>\n<em>hxxp:\/\/bayun87.narod2.ru\/#borjita30.html<\/em><br \/>\n<em>hxxp:\/\/dimaspodpor.narod.ru\/#borjiabar.html<\/em><br \/>\n<em>hxxp:\/\/denis1898.narod.ru\/#borjavdv.html<\/em><br \/>\n<em>hxxp:\/\/dodge2106.narod.ru\/#borjateran.html<\/em><br \/>\n<em>hxxp:\/\/yashka-tut.narod.ru\/#borjarevo.html<\/em><br \/>\n<em>hxxp:\/\/dima230368.narod2.ru\/#YHAOfficial.html<\/em><br \/>\n<em>hxxp:\/\/autkaee.narod.ru\/#YHALondonHostel.html<\/em><br \/>\n<em>hxxp:\/\/CracknelMan.narod.ru\/#YHAAAAAAN.html<\/em><br \/>\n<em>hxxp:\/\/northe.narod2.ru\/#YH.html<\/em><br \/>\n<em>hxxp:\/\/blagiyv.narod2.ru\/#YGwirfoddolwyr.html<\/em><br \/>\n<em>hxxp:\/\/dashunya-19.narod2.ru\/#YGunna.html<\/em><br \/>\n<em>hxxp:\/\/school13spb.ru\/cli\/#YGrissa.html<\/em><br \/>\n<em>hxxp:\/\/467777.ru\/media\/#YGreddrumm.html<\/em><br \/>\n<em>hxxp:\/\/microlab2.narod.ru\/#YGjerde.html<\/em><br \/>\n<em>hxxp:\/\/spicccka.narod2.ru\/#YGiardina.html<\/em><br \/>\n<em>hxxp:\/\/bam75.narod.ru\/#YGharby.html<\/em><br \/>\n<em>hxxp:\/\/valov1994.narod2.ru\/#YGharbi.html<\/em><br \/>\n<em>hxxp:\/\/den-inferno.narod2.ru\/#YGfanboy.html<\/em><br \/>\n<em>hxxp:\/\/awn55.narod2.ru\/#YG_Wood.html<\/em><br \/>\n<em>hxxp:\/\/blacksacap.narod2.ru\/#YG_SWAG.html<\/em><br \/>\n<em>hxxp:\/\/e9308.narod.ru\/#Silvm85.html<\/em><br \/>\n<em>hxxp:\/\/armat30.narod2.ru\/#SilviusPotter.html<\/em><br \/>\n<em>hxxp:\/\/ass-351.narod2.ru\/#Silviu_I.html<\/em><br \/>\n<em>hxxp:\/\/dantistnt18.narod2.ru\/#SilviuStelian.html<\/em><br \/>\n<em>hxxp:\/\/ninapu.narod2.ru\/#Silvitrii.html<\/em><br \/>\n<em>hxxp:\/\/dedun2006.narod.ru\/#Silviptr.html<\/em><br \/>\n<em>hxxp:\/\/olezhko-polmin.narod2.ru\/#PaoloSpampinat1.html<\/em><br \/>\n<em>hxxp:\/\/maxulya.narod2.ru\/#OliviaMehaffey.html<\/em><br \/>\n<em>hxxp:\/\/dawmenkor.narod2.ru\/#OliviaMcIntire.html<\/em><br \/>\n<em>hxxp:\/\/kolya-turkin.narod.ru\/#OliviaMcGuckin.html<\/em><br \/>\n<em>hxxp:\/\/vffmeztginhwcpu.narod2.ru\/#OliviaMayT.html<\/em><br \/>\n<em>hxxp:\/\/foxy-zone.narod.ru\/#OliviaMatokee.html<\/em><br \/>\n<em>hxxp:\/\/balzam201.narod2.ru\/#OliviaMasey1.html<\/em><br \/>\n<em>hxxp:\/\/reginavip.narod2.ru\/#OliviaMarshman.html<\/em><br \/>\n<em>hxxp:\/\/jony666.narod.ru\/#OliviaMarr7.html<\/em><br \/>\n<em>hxxp:\/\/dr-patap.narod.ru\/#JagzMahal.html<\/em><br \/>\n<em>hxxp:\/\/apostols13.narod2.ru\/#JagyJose.html<\/em><\/p>\n<p>What do all of these domains have in common? Next to the identical malware served on the affected hosts, the redirection also takes place through the following domains<\/p>\n<p><em>hxxp:\/\/traffichouse.ru\/?2 &#8211; 176.57.209.69<\/em><br \/>\n<em>hxxp:\/\/traffichouse.ru\/?5 &#8211; 176.57.209.69<\/em><\/p>\n<p><strong>Responding to the same 176.57.209.69 IP are also the following domains:<\/strong><br \/>\n<em>forex-shop.com<\/em><br \/>\n<em>abolyn.twmail.info<\/em><br \/>\n<em>pclive.ru<\/em><br \/>\n<em>ecoinstrument.ru<\/em><\/p>\n<p><strong>Client-side exploits serving domain:<\/strong>\u00a0<em>hxxp:\/\/oomatsu.veta.su\/main.php?page=afaf1d234c788e63<\/em><\/p>\n<p>Upon successful client-side exploitation, the campaign\u00a0drops <a href=\"https:\/\/www.virustotal.com\/file\/139d7cad16e51e3431015756492d09482fcb07ea0168eac532a83103a62485b5\/analysis\/\"><strong>MD5: 5d1e7ea86bee432ec1e5b3ad9ac43cfa<\/strong><\/a> on the affected hosts.<\/p>\n<p>Upon execution, the sample phones back to the following URLs, where it downloads additional malware on the affected hosts:<\/p>\n<p><em>hxxp:\/\/112.121.178.189\/api\/urls\/?ts=1f737428&amp;affid=35000<\/em><br \/>\n<em>hxxp:\/\/thanosactpetitioned.cu.cc\/f\/notepad.exe?ts=1f737428&amp;affid=35000<\/em><\/p>\n<p>We&#8217;ve already seen malware phoning back to the command and control server in the recently profiled &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/07\/26\/spamvertised-download-your-usps-label-themed-emails-serve-malware\/\"><strong>Spamvertised \u2018Download your USPS Label\u2019 themed emails serve malware<\/strong><\/a>&#8221; campaign.\u00a0Clearly, both campaigns are launched by the same cybercriminal\/gang of cybercriminals that are basically rotating the distribution and infection vectors of their\u00a0campaign.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywere<\/strong><\/a>\u00a0users are proactively protected from this threat.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twitter users, beware! Over the past several days, cybercriminals have been persistently spamvertising thousands of exploits and malware serving links across the most popular micro blogging service. Upon clicking on the clicks, users are exposed to the exploits served by the Black Hole web malware exploitation kit. What&#8217;s so special about this campaign? What&#8217;s the [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,5583,3863,3617,11519,3881,4863,5411,10335,5135,10109,11077,4197,3477,11153,10741,4721,10047,3529,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7738"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=7738"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7738\/revisions"}],"predecessor-version":[{"id":25385,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7738\/revisions\/25385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=7738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=7738"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=7738"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=7738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}