{"id":8257,"date":"2012-10-15T12:00:36","date_gmt":"2012-10-15T19:00:36","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8257"},"modified":"2018-10-05T11:29:39","modified_gmt":"2018-10-05T17:29:39","slug":"cybercriminals-impersonate-ups-serve-client-side-exploits-and-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/10\/15\/cybercriminals-impersonate-ups-serve-client-side-exploits-and-malware\/","title":{"rendered":"Cybercriminals impersonate UPS, serve client-side exploits and malware"},"content":{"rendered":"<p>Over the past 24 hours, cybercriminals spamvertised millions of email addresses, impersonating UPS, in an attempt to trick end users into viewing the malicious .html attachment. Upon viewing, the file loads a tiny iFrame attempting to serve client-side exploit served by the latest version of the Black Hole Exploit kit, which ultimately drops malware on the affected host.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p>Sample screenshot of the spamvertised email:<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8259\" title=\"UPS_Spam_Email_Exploits_Malware_Black_Hole_Exploit_Kit\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit.png\" alt=\"\" width=\"332\" height=\"287\" \/><\/a><\/p>\n<p><strong>Sample malicious iFrame URLs found in multiple malicious .html files:<\/strong>\u00a0<em>hxxp:\/\/denegnashete.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/soisokdomen.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/diareuomop.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/omahabeachs.ru:8080\/forum\/links\/column.php<\/em> ;<em>hxxp:\/\/penelopochka.ru:8080\/forum\/showthread.php?page<\/em>; <em>hxxp:\/\/furnitura-forums.ru:8080\/forum\/showthread.php?page<\/em>; <em>hxxp:\/\/onerussiaboard.ru:8080\/forum\/showthread.php?page<\/em>; <em>hxxp:\/\/online-gaminatore.ru:8080\/forum\/showthread.php<\/em>; <em>hxxp:\/\/bmwforummsk.ru:8080\/forum\/showthread.php?page<\/em><\/p>\n<p><strong>Sample detection rate for a malicious .html file found in the spamvertised emails<\/strong>:\u00a0UPS_N21489880.htm &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/96b9f828cbf690413cee3c8ef63c43ba85ec73d6f487edd4e1ff478c9e4925f1\/analysis\/1349010607\/\"><strong>MD5: 38a2a54d6e7391d7cd00b50ed76b9cfb<\/strong><\/a> &#8211; detected by 26 out of 43 antivirus scanners as Trojan.Iframe.BCK; Trojan-Downloader.JS.Iframe.dbh<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8266\" title=\"UPS_Spam_Email_Exploits_Malware_Black_Hole_Exploit_Kit_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit_01.png\" alt=\"\" width=\"592\" height=\"256\" \/><\/a><\/p>\n<p><strong>Client-side exploits serving URL:<\/strong>\u00a0<em>hxxp:\/\/denegnashete.ru:8080\/forum\/data\/java.jar<\/em> &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/37d801882221dbc8f9da510e9531434ffb63faf61052c0263b658ca227b9a453\/analysis\/1349011941\/\"><strong>MD5:\u00a086946ec2d2031f2b456e804cac4ade6d<\/strong><\/a> &#8211; detected by 25 out of 43 antivirus scanners as\u00a0Java\/Cve-2012-1723;\u00a0Exploit:Java\/CVE-2012-4681.H<\/p>\n<p><strong>denegnashete.ru<\/strong> is currently responding to the following IPs &#8211; 84.22.100.108; 190.10.14.196; 203.80.16.81; 61.17.76.12; 213.135.42.98<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8267\" title=\"UPS_Spam_Email_Exploits_Malware_Black_Hole_Exploit_Kit_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/09\/ups_spam_email_exploits_malware_black_hole_exploit_kit_02.png\" alt=\"\" width=\"232\" height=\"427\" \/><\/a><\/p>\n<p><strong>Related malicious domains part of the campaign&#8217;s infrastructure:<\/strong><br \/>\n<strong>rumyniaonline.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>denegnashete.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>dimabilanch.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ioponeslal.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>moskowpulkavo.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>omahabeachs.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>uzoshkins.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>sectantes-x.ru<\/strong> &#8211; 84.22.100.108<\/p>\n<p><strong>Name servers part of the campaign&#8217;s infrastructure:<\/strong><br \/>\n<strong>ns1.denegnashete.ru<\/strong> &#8211; 62.76.190.50<br \/>\n<strong>ns2.denegnashete.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns3.denegnashete.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns4.denegnashete.ru<\/strong> &#8211; 91.194.122.8<br \/>\n<strong>ns5.denegnashete.ru<\/strong> &#8211; 62.76.188.246<br \/>\n<strong>ns6.denegnashete.ru<\/strong> &#8211; 178.63.51.54<\/p>\n<p>This isn&#8217;t the first time that cybercriminals have impersonated UPS. Go through related analysis of previous campaigns impersonating the company:<\/p>\n<ul>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/08\/31\/cybercriminals-impersonate-ups-serve-malware\/\"><strong>Cybercriminals impersonate UPS, serve malware<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/07\/18\/cybercriminals-impersonate-ups-in-client-side-exploits-and-malware-serving-spam-campaign\/\"><strong>Cybercriminals impersonate UPS in client-side exploits and malware serving spam campaign<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/06\/07\/spamvertised-ups-delivery-notification-emails-serving-client-side-exploits-and-malware\/\"><strong>Spamvertised \u2018UPS Delivery Notification\u2019 emails serving client-side exploits and malware<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/06\/25\/spamvertised-your-ups-delivery-tracking-emails-serving-client-side-exploits-and-malware\/\"><strong>Spamvertised \u2018Your UPS delivery tracking\u2019 emails serving client-side exploits and malware<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/09\/04\/spamvertised-wire-transfer-confirmation-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Spamvertised \u2018Wire Transfer Confirmation\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from this threat.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past 24 hours, cybercriminals spamvertised millions of email addresses, impersonating UPS, in an attempt to trick end users into viewing the malicious .html attachment. Upon viewing, the file loads a tiny iFrame attempting to serve client-side exploit served by the latest version of the Black Hole Exploit kit, which ultimately drops malware on [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12307,12263,12303,11341,6187,6177,9563,10103,12297,11229,11227,4911,10109,11343,6189,12301,12299,12305,10297,10625],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8257"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8257"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8257\/revisions"}],"predecessor-version":[{"id":25449,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8257\/revisions\/25449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8257"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8257"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}