Research

Malicious PACs and Bitcoins

Now cybercriminals from Brazil are also interested in Bitcoin currency. In order to join the horde of phishers on the lookout for the virtual currency they have applied their best malicious technique: malicious PAC on web attacks, and phishing domains.

The malicious usage of PAC (Proxy Auto-Config) among Brazilian black hats is not something new we ve known about it since 2007. Generally, these kind of malicious scripts are used to redirect the victim s connection to a phishing page of banks, credit cards and so on. We described these attacks in detail here. In 2012 a Russian Trojan banker called Capper also started using the same technique. When it s used in drive-by-download attacks, it becomes very effective.

After registering the domain java7update.com, Brazilian criminals started attacking several websites, inserting a malicious iframe in some compromised pages:

The iframe loads a malicious Java applet prepared to change the proxy configuration on web browser such as IE and Firefox. The URL used in the attack points to a file called update.pac that looks like this:

In an attempt to bypass detection based on signatures, the script uses multiple concatenations. Once cleaned, the script will look like this:

Note that among the sites of Brazilian banks and credit card companies that are targeted by the malicious script, there is the domain mtgox.com, the most widely used bitcoin currency exchange market. There is also a redirection to the domain mtgox.com.br, that doesn t exist in Brazil, but it s still resolved on infected machines, of course, pointing to a phishing page:

On a clean computer, access to the domain mtgox.com.br displays this page:

The goal is clear: redirect victims to a fake page of mtgox.com to steal credentials, and consequently, some bitcoins. This is one of the fake pages used in the attack.

If you re a regular visitor to mtgox.com, we recommend activating the two-factor authentication in your account so as not to fall victim to this kind of attack.

The malicious PAC is detected as Trojan.JS.Redirector.za.

Malicious PACs and Bitcoins

Your email address will not be published. Required fields are marked *

 

Reports

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox