Spam and phishing mail

Royal Baby Lures to Blackhole Site

Kaspersky Lab congratulates the royal couple on the birth of their new baby boy and wish them all well for the future. It is truly joyous news that is being celebrated in the UK and in the rest of the world.

However because it is such big news, it didn’t take long for malicious elements to misuse it as follows: “The Royal Baby: Live updates” promises an email arriving at our spam traps today. A link named “Watch the hospital-cam” is the contained trap which leads to … nowhere because it seems that it has already been cleaned. By the looks of it, it may be a compromised legitimate website which got cleaned.

9117

But we are still interested in what the malicious content could be and we didn’t need to search for long. Exactly _one_ hit for our web search was shown at the time of writing this article.

9118

What we find there is basically the same textual content as we had seen in the email but there is one difference: the contained link to the “hospital-cam” is currently still alive. It contains three links with *.js naming on yet another set of hosts.

9119

Checking these, we finally see what it is all about, namely a “Blackhole Exploit Kit” serving URL – a drive-by approach to infect unprotected users “on the fly”.

9120

Kaspersky Lab products detect this threat as “Trojan-Downloader.JS.Expack.aiy”.

Royal Baby Lures to Blackhole Site

Your email address will not be published. Required fields are marked *

 

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox