{"id":8852,"date":"2012-11-30T00:00:13","date_gmt":"2012-11-30T07:00:13","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8852"},"modified":"2018-10-05T11:56:39","modified_gmt":"2018-10-05T17:56:39","slug":"bogus-intuit-software-order-confirmations-lead-to-black-hole-exploit-kit","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/11\/30\/bogus-intuit-software-order-confirmations-lead-to-black-hole-exploit-kit\/","title":{"rendered":"Bogus &#8216;Intuit Software Order Confirmations&#8217; lead to Black Hole Exploit Kit"},"content":{"rendered":"<p>Sticking to their well proven practice of systematically rotating impersonated brands, the cybercriminals behind a huge majority of the malicious campaigns that we&#8217;ve been profiling recently are once again impersonating <a href=\"http:\/\/blog.webroot.com\/tag\/intuit\/\"><strong>Intuit<\/strong><\/a> in an attempt to trick its customers into clicking on links exposing them to the client-side exploits served by the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot from the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/fake_intuit_software_order_confirmation_email_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8854\" title=\"Fake_Intuit_Software_Order_Confirmation_Email_Spam_Exploits_Malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/fake_intuit_software_order_confirmation_email_spam_exploits_malware.png\" alt=\"\" width=\"614\" height=\"277\" \/><\/a><\/p>\n<p><strong>Sample spamvertised URL redirector:<\/strong> <em>hxxp:\/\/www.mysnap.com.tw\/sites\/default\/files\/upload.htm?RANDOM_CHARACTERS<\/em><\/p>\n<p><strong>Client-side exploits serving URL:<\/strong> <em>hxxp:\/\/moneymakergrow.ru:8080\/forum\/links\/column.php<\/em><\/p>\n<p><strong>Malicious domain name reconnaissance:<\/strong><br \/>\n<strong>moneymakergrow.ru<\/strong> &#8211; 202.180.221.186, AS24496; 203.80.16.81, AS24514; 207.126.57.208<br \/>\nName server: <strong>ns1.moneymakergrow.ru<\/strong> &#8211; 62.76.178.233<br \/>\nName server: <strong>ns2.moneymakergrow.ru<\/strong> &#8211; 132.248.49.112<br \/>\nName server: <strong>ns3.moneymakergrow.ru<\/strong> &#8211; 84.22.100.108<br \/>\nName server: <strong>ns4.moneymakergrow.ru<\/strong> &#8211; 65.99.223.24<\/p>\n<p>The following malicious domains also respond to the same IPs:<br \/>\n<strong>limonadiksec.ru<\/strong><br \/>\n<strong>geforceexlusive.ru<\/strong><br \/>\n<strong>sonatanamore.ru<\/strong><br \/>\n<strong>linkrdin.ru<\/strong><br \/>\n<strong>lemonadiom.ru<\/strong><br \/>\n<strong>peneloipin.ru<\/strong><br \/>\n<strong>forumibiza.ru<\/strong><br \/>\n<strong>donkihotik.ru<\/strong><br \/>\n<strong>finitolaco.ru<\/strong><br \/>\n<strong>controlleramo.ru<\/strong><br \/>\n<strong>fionadix.ru<\/strong><\/p>\n<p>Although we couldn&#8217;t reproduce the client-side exploitation, we&#8217;ve already seen the majority of these malicious domains in previously profiled campaigns:<\/p>\n<p><strong>moneymakergrow.ru<\/strong> &#8211; seen in &#8211; &#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>limonadiksec.ru<\/strong> &#8211; seen in &#8211; &#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/10\/19\/regarding-your-friendster-password-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Regarding your Friendster password\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>geforceexlusive.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>sonatanamore.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/10\/19\/regarding-your-friendster-password-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Regarding your Friendster password\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>linkrdin.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/21\/cybercriminals-spamvertise-bogus-microsoft-license-orders-serve-client-side-exploits-and-malware\/\"><strong>Cybercriminals spamvertise bogus \u2018Microsoft License Orders\u2019 serve client-side exploits and malware<\/strong><\/a>&#8221;<br \/>\n<strong>lemonadiom.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>peneloipin.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>forumibiza.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>finitolaco.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Fwd: Scan from a Xerox W. Pro\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<br \/>\n<strong>controlleramo.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;; &#8220;<strong>Multiple \u2018Inter-company\u2019 invoice themed campaigns serve malware and client-side exploits<\/strong>&#8221;<br \/>\n<strong>fionadix.ru<\/strong> &#8211; seen in &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221;<\/p>\n<p><strong>Name servers part of the campaign&#8217;s infrastructure:<\/strong><br \/>\n<strong>ns1.limonadiksec.ru<\/strong> &#8211; 62.76.46.195<br \/>\n<strong>ns2.limonadiksec.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns3.limonadiksec.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns4.limonadiksec.ru<\/strong> &#8211; 91.194.122.8<br \/>\n<strong>ns5.limonadiksec.ru<\/strong> &#8211; 62.76.188.246<br \/>\n<strong>ns1.geforceexlusive.ru<\/strong> &#8211; 62.76.47.51<br \/>\n<strong>ns2.geforceexlusive.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.geforceexlusive.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.geforceexlusive.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.sonatanamore.ru<\/strong> &#8211; 62.76.47.51<br \/>\n<strong>ns2.sonatanamore.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.sonatanamore.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns1.linkrdin.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.linkrdin.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.linkrdin.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.linkrdin.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.lemonadiom.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.lemonadiom.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.lemonadiom.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.lemonadiom.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.peneloipin.ru<\/strong> &#8211; 62.76.186.190<br \/>\n<strong>ns2.peneloipin.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.peneloipin.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.peneloipin.ru<\/strong> &#8211; 65.99.223.24<br \/>\n<strong>ns1.forumibiza.ru<\/strong> &#8211; 62.76.186.190<br \/>\n<strong>ns2.forumibiza.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns3.forumibiza.ru<\/strong> &#8211; 50.22.102.132<br \/>\n<strong>ns4.forumibiza.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.donkihotik.ru<\/strong> &#8211; 62.76.186.190<br \/>\n<strong>ns2.donkihotik.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns3.donkihotik.ru<\/strong> &#8211; 50.22.102.132<br \/>\n<strong>ns4.donkihotik.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.finitolaco.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.finitolaco.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.finitolaco.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.finitolaco.ru<\/strong> &#8211; 213.251.171.30<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sticking to their well proven practice of systematically rotating impersonated brands, the cybercriminals behind a huge majority of the malicious campaigns that we&#8217;ve been profiling recently are once again impersonating Intuit in an attempt to trick its customers into clicking on links exposing them to the client-side exploits served by the Black Hole Exploit Kit. [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[6187,6177,12407,12537,12539,11733,11729,12543,12535,6189,12437,12547,11737,11735,11731,12541,12533,12545,11747,11745],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8852"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8852"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8852\/revisions"}],"predecessor-version":[{"id":25551,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8852\/revisions\/25551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8852"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8852"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}