Research

Malicious PACs and Bitcoins

Now cybercriminals from Brazil are also interested in Bitcoin currency. In order to join the horde of phishers on the lookout for the virtual currency they have applied their best malicious technique: malicious PAC on web attacks, and phishing domains.

The malicious usage of PAC (Proxy Auto-Config) among Brazilian black hats is not something new we ve known about it since 2007. Generally, these kind of malicious scripts are used to redirect the victim s connection to a phishing page of banks, credit cards and so on. We described these attacks in detail here. In 2012 a Russian Trojan banker called Capper also started using the same technique. When it s used in drive-by-download attacks, it becomes very effective.

After registering the domain java7update.com, Brazilian criminals started attacking several websites, inserting a malicious iframe in some compromised pages:

The iframe loads a malicious Java applet prepared to change the proxy configuration on web browser such as IE and Firefox. The URL used in the attack points to a file called update.pac that looks like this:

In an attempt to bypass detection based on signatures, the script uses multiple concatenations. Once cleaned, the script will look like this:

Note that among the sites of Brazilian banks and credit card companies that are targeted by the malicious script, there is the domain mtgox.com, the most widely used bitcoin currency exchange market. There is also a redirection to the domain mtgox.com.br, that doesn t exist in Brazil, but it s still resolved on infected machines, of course, pointing to a phishing page:

On a clean computer, access to the domain mtgox.com.br displays this page:

The goal is clear: redirect victims to a fake page of mtgox.com to steal credentials, and consequently, some bitcoins. This is one of the fake pages used in the attack.

If you re a regular visitor to mtgox.com, we recommend activating the two-factor authentication in your account so as not to fall victim to this kind of attack.

The malicious PAC is detected as Trojan.JS.Redirector.za.

Malicious PACs and Bitcoins

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox