But after some more research I noticed that it was not just Sweden that was affected, it seemed to be a global epidemic. I also noticed that we were talking about two different redirectors; Trojan.JS.Redirector.ro and Trojan.JS.Pakes.cp.
In the next step, the victims are redirected to a server which validates the origin (country) of the victim. Depending on the location a malicious payload is executed. In one example that we have seen, users are redirected to a malicious website posing as a YouTube video, that tries to get the user to download an update to Flash Player, which is actually malware.
The technical setup is almost identical to the Lizamoon case we read about a few months back. Same filenames, same techniques and also the server setups looks very identical.
If the victim downloads and executes the fake flash update, it will upon execution connect back to the following servers:
- 18.104.22.168/?19= (Virtual Host: update.19runs10q3.com)
Upon execution the malware will modify the hosts file and “poison” known domains. It will make the infected computer use rogue DNS servers, and redirect the users to malicious websites. The following configuration file has been extracted from the malware:
The malware will then changes the DNS configuration by modifying the hosts file to poison the following hostnames:
- 22.214.171.124 www.google-analytics.com.
- 126.96.36.199 ad-emea.doubleclick.net.
- 188.8.131.52 www.statcounter.com.
Additional will the malware download and excecute updates. Some of the following requests have been collected:
v=spf1 a mx ip4:%d.%d.%d.%d/%d ?all
We are also seeing a very high increase in Java, PDF and Flash exploits in the wild, but we are still unsure if this attack is also responsible for exploiting victims exposed to these vulnerabilities. But in all countries mentioned in the statistics, these exploits have dramatically increased in September and October. As soon as i have information i will publish it.