Detected malicious CookieBomb javascript by avast! Web Shield!

Reported to me by my good forum friend Pondus as he stumbled upon this malcode found here:
htxp://urlquery.net/report.php?id=4486758
Do not venture out there because that urlquery net uri will be blocked immediately by the avast! Web Shield as:
JS:iframe-CSU[Trj] redirecting to a Blackhole Exploit kit
Re: http://sitecheck.sucuri.net/results/www.polityczni.pl
also see: http://scanurl.net/?u=http%3A%2F%2Fwww.polityczni.pl%2F&uesb=Check+This+URL#results
See: http://www.google.com/safebrowsing/diagnostic?site=polityczni.pl
and http://www.avgthreatlabs.com/website-safety-reports/domain/polityczni.pl/
htxp://www.quttera.com/detailed_report/www.polityczni.pl this URI is also being blocked by avast Web Shield but as JS:Decode-AQC[Trj]
as it is revealing just enough of the malcode to get an avast Web Shield alert!
More info on malicious CookieBomb attacks and encoding here: http://malwaremustdie.blogspot.com/2013/07/a-note-of-modification-of-obfuscation.html
link article author = unixfreaxjp Quoted from there

called this as #CookieBomb attack, it uses the obfuscation JavaScript to burp the hidden redirection via IFRAME and the cookie condition to be used as a ticket for malware infection further maliciousre direction

polonus

Various infections mentioned for the IP and that particular domain at VT: https://www.virustotal.com/en/ip-address/79.96.60.21/information/
Analizuję drogę przejścia pakietów do 79.96.60.21:

HOST: vmy1.home.net.pl Loss% Snt Last Avg Best Wrst StDev
1.|-- adx01.home.net.pl 0.0% 5 2.5 1.6 0.5 2.5 0.8
2.|-- 62.129.251.154 0.0% 5 0.6 71.0 0.6 193.5 94.0
3.|-- v066061.home.net.pl 0.0% 5 0.3 0.6 0.3 1.5 0.5
Also the blackhole infection from that IP: http://support.clean-mx.de/clean-mx/viruses?id=13261704

For the cookie bomb javascript malcode redirection read: http://malwaremustdie.blogspot.jp/2013/07/proof-of-concept-of-cookiebomb-attack.html
link article author and PoC credits to unixfreaxjp
Here avast Web Shield also blocks: htxp://evuln.com/tools/malware-scanner/www.polityczni.pl/ …/|as infected with JS:ifarme-CTO[Trj]{gzip}

polonus

and only the top dogs sniff this
https://www.virustotal.com/en/file/4bc03c9a388d8c7b93571cc0b8296af74d786cc7eae46e8251d053f0d2bcc2e5/analysis/1376169217/

Yep Pondus, only the very top dogs like avast! webshield blocks it right away as the javascrript code. The others get it in a second stage as the malcode is trying to redirect for some proportion to Blackhole Exploit kit:
redirecting to malcode are…(info from the Malware Crusader at Malware Must Die)
h00p://mmcmt.org/
h00p://www.wettndry.com/
h00p://gorillarobotfactory.com/
h00p://dcprevisores.com/
h00p://ip-72-167-99-107.ip.secureserver.net/
h00p://syccoservices.com/
h00p://cdijescolhacerta.casabmse.pt/
h00p://www.iimspublications.com/
h00p://www.shaversandrazor.com/
h00p://www.newlooklaser.ca/
h00p://www.smartageinsurance.com/
h00p://www.jumpshotmedia.com/
h00p://www.wolfetech.com/
h00p://bracapulco.com/
h00p://www.naturalbalancenow.com/
h00p://www.ishojtv.com/
h00p://www.sensorsadvance.com/
h00p://www.newlooklaser.ca/
h00p://bracapulco.com/
h00p://mosaicnarrative.com/
h00p://westonflmovers.com/
h00p://www.1stpagemarketingservices.com/
h00p://2528c.com/
h00p://starlighthca.com/
h00p://billymorganart.com/
h00p://flyxilla.com/
h00p://thinkingknowledge.com/
h00p://www.angelavanegas.com/
h00p://sportingdelights.com/
h00p://scholarlythinking.com/
h00p://limeworks.org/blog/wp-includes/js/comment-repl%3D/

This is combining the evils of PHP injection and javascript obfuscation. Always be aware of the 7 potentially insecure functions in javascript that could lead to malcode ->: escape(), eval(), link(), unescape(), exec(), search() combined with content as HTML tags, iframes, zero size iframes, lines and hyperlinks

Know the malcreant never rests, and malware should really be gone!

Damian

Hi Pondus,

The CookirBomb javascript malcode trick is performed as described here: http://stackoverflow.com/questions/13764925/simple-way-to-obfuscate-javascript-code-by-php - info T.J. Crowder - (the use is cyber criminal access to credit card information etc.)

The attack is possible through website vulnerabilities, header gives away that IdeaWebServer/v0.80 is being used.
JS in every templates index.php file, read: http://forum.joomla.org/viewtopic.php?f=714&t=807708 (Matt Simonsen SRI hosting)
All sorts of variations are being made on this same theme.

Website and server admins should really start to harden their software and what is very important to check all input data to be verified. Here we can esatblish why that is: https://asafaweb.com/Scan?Url=www.polityczni.pl
while we see an excessive headers warning as configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.
and a clickjacking warning as it appears no X-Frame-Options header was returned from the server which means that this website could be at risk of a clickjacking attack. With the exessive header information this attack as we found described in a Google pastebin cache could be performed against it:

  • Server: IdeaWebServer/v0.80

  • /cgibin/guestbook/passwd: GuestBook r4 from xxxxxxx.r2 dot ru stores the admin password in a plain text file.

  • /phpimageview.php?pic=javascript:alert(‘Vulnerable’): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html. I won’t further dwell on this because it is beyond the scope of this post…
    etc. etc.

pol

Still a lot of live malware from that hoster: http://support.clean-mx.de/clean-mx/viruses.php?netname=HOMEPL&sort=url%20desc&response=alive
avast! detects even this → https://www.virustotal.com/en/file/c38d71921f134bc548f4e1e172c6c72aaabf62bb2040c707e9f0837b3034f127/analysis/
Good to also study these for example: http://support.clean-mx.de/clean-mx/view_virusescontent.php?url=http%3A%2F%2Fwww.psltv.pl%2Findex.php%3Fplik%3D1739%26amp%3Bso%3D58
See attached image of that what we treat here in this thread. Read on the code given there here: https://www.phpbb.com/community/viewtopic.php?f=46&t=2188243 (see posting Hellemans2003) particularly see code here: https://www.phpbb.com/community/viewtopic.php?f=46&t=2188243#
and the reply from NoxWizard a bit further down in that thread…

polonus