Apologies if this is the wrong section, but there appear to be reports of such things here.
The site I’m concerned about links to a download page for Eaton (Powerware) software. The linked page looks genuine, except for some subtle differences. I have been through and compared the whole (tedious) download process on the both the real site and the second-party linked site. Two differences there are: The original site ‘remembers’ a second email I entered once, the linked site doesn’t; And, the linked site shows https:// in the address bar where the original site doesn’t.
It may not be a problem. I couldn’t detect malware anywhere, buut…
The first time I tried to install something from the second hand site (a while ago now), all it did was place my “Homegroup” whatsit (NOT a Shortcut!) on my Desktop and I couldn’t get rid of it except by System Restore.
A little worrying, imo, tho I can’t replicate it now.
Thanks. I did a Virustotal check on the URL’s. They test clean there.
Anyhow… The one I was bothered about is http://www.xentrikDOTnet/software/lansafe.html. The “Download now” goes to the same URL as I can find directly through Eaton’s own site. The page displayed, however, was slightly different.
See the code hick-up here: http://jsunpack.jeek.org/?report=437f4b6a51e5187ba7524c6597925d62197a0e6a
wXw.xentrik dot net/resources/ui.core.js
status: (referer=wXw.xentrik dot .net/software/lansafe.html)saved 13932 bytes 726343f71a9c691d959bbe720f9085b63c1b4598
info: [decodingLevel=0] found JavaScript
error: undefined variable jQuery
error: undefined variable $.fn
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var $.fn = 1;
error: line:1: …^
suspicious:
DNS issues - errors: No SOA record found for wXw.xentrik dot net.
No SOA record was found when querying the name server. This is most probably due to a misconfiguration at the name server - a zone must have a SOA record.
Nameserver 64.68.192.210 does not do DNSSEC extra processing.
Nameserver 72.52.2.1 does not do DNSSEC extra processing.
Nameserver 64.68.196.10 does not do DNSSEC extra processing.
Try to explain to you as best I can. I have fed the site url to jsunpack, a javascript unpacker tool and javascript malcode analyzer, meant for security researchers. Everything I found was benign…
What I reported there is a what I myself will call some “code hick-up”. It is flagged “suspicious” as the code takes somewhat longer to perform as expected - max runtime is exceeded by 10 seconds, probably because of errors for that ui.core.js code in Firefox, but also kicks some errors in IE. The particular problem in IE is being reported here by “mssbee”, read: http://wordpress.org/support/topic/plugin-vslider-fix-if-you-get-an-error-with-ie
Most Content Management Software problems do not arise from the core software as this is often and regularly checked against insecurities and therefore comes fully updated and patched. It is free plug-ins and themes where the exploitable and code that can be abused/hacked is found.
Javascript coding is performed with more security in mind nowadays, but time pressure for developers and the need to “bend some curves” for better code performance under all circumstances and browser differences will make that we see such issues appear and sometimes they create exploitable situations that could lead to infestations of sorts. Here I get a “proxy-revalidate, must-revalidate” with this application/javascript.
Well we can establish there is no malcode there: http://wepawet.iseclab.org/view.php?hash=cccebf64ae63c98b561cba49624fa288&t=1394976349&type=js
See response headers here: https://www.virustotal.com/nl/url/ff6433dee42ac2f59298298fab6fd0474926c47a9132d7661b7686508ce16b30/analysis/1394976419/
is quirky across browsers - it is a funcrtion pointer that you actually do not see in javascript.
But these are issues that should not be worrying you, but that should be a concern for the jQuery developers.
Hope that you understand now that analyzing website malcode is a rather complicated business, it is very very interesting stuff.
So it was fun to dive a little further into this for you. Have a nice day and stay safe and secure,
I’m glad to hear it was some fun for you. And, I can very well imagine it being that interesting, albeit complicated.
I could’ve played it safer by not attempting to download the software from an outside source. Not sure now what I thought it might accomplish, but was at my wit’s end trying to get the program running properly. Anyway, it linked through to the Eaton site so I thought it would be ok. There is still a question, if the Eaton page linked to xentrik.net might be counterfeit and it contain malware. I think that’s unlikely, really, but it is a bit different from the original (as in link posted previously).
I always had the idea that Lansafe was required for the UPS to do a ‘graceful’ shutdown. Tho, in the lifetime of the first battery (about 15 years), I never found out for sure…
In any case, where the problem lay this time was the (required) driver installation which I wouldn’t have known about except for Lansafe not functioning properly. The driver installation was a breeze in XP; Not so in 8.1.