The popular video streaming site DailyMotion has been hit by a malvertising attack. Malwarebytes explains:
We have been tracking an attack via .eu sites for several days but were missing the final payload. However, this changed when we managed to reproduce a live infection via an ad call coming from popular video streaming site DailyMotion, ranked among Alexa's top 100 sites.
This malversiting incident happened via real-time bidding (RTB) within the WWWPromoter marketplace. A decoy ad (pictured below) from a rogue advertiser initiates a series of redirections to .eu sites and ultimately loads the Angler exploit kit.
The bogus advertiser is using a combination of SSL encryption, IP blacklisting and JavaScript obfuscation and only displays the malicious payload once per (genuine) victim. In addition, Angler EK also fingerprints potential victims before launching its exploits to ensure the user is not a security researcher, honeypot or web crawler.
[...] The incident was resolved very rapidly once the proper contacts were made and the problem isolated. For this, we would like to them[sic] all parties involved in taking such prompt action, therefore limiting the potential damage to innocent users.
This particular malvertising attack is one of a few campaigns we have been tracking which is much more sophisticated than the average incidents we encounter daily. We can say that lately threat actors have really stepped up their game in terms of being very stealthy and making a particular ad call look benign when reproduced in a lab environment. Indeed, the problem comes when we suspect foul play but can't prove it with a live infection. It is difficult to convince ad networks to take action, when on the surface there's nothing wrong with a particular advertiser.
Here's some more information about the Angler exploit kit.
(Score: 5, Funny) by E_NOENT on Wednesday December 09 2015, @02:59PM
I use adblock. uBlock. Privacy Badger. CatBlock. Ghostery. Tor. NoScript. And a bunch of other privacy guard plugins you probably never heard of.
I browse the web using a chrooted jail (inside a one-time use, stripped-down, throwaway OpenBSD VM) with an automated, scripted combination of WWW::Mechanize, curl, netcat, wget, 'strings,' and eLinks. I use a variety of increasingly specific HTML parsers to guarantee valid HTML, strip all tags, remove javascript, hyperlinks to one-pixel GIF trackers, inlined ad content, and references to Donald Trump.
I use /etc/hosts extensively to avoid bad sites:
bash-4.2$ grep 127.0.0.1 /etc/hosts| wc -l
743982
(I use several custom, transient, cloud-based, anonymized web crawlers to help me continually add to this file.)
All downloaded files are piped successively through an ASCII character filter (only ASCII codes 65-127 accepted), an antivirus mechanism, a spellchecker, a grammar checker, and a pretty printer. The output is then securely copied to another throwaway VM on another machine where the page is automatically opened in read-only mode in TECO. After reading a single page, all VMS are destroyed, and a low-level format is executed on the partition holding them. My main machines are all powered down for one full minute (to avoid any cold boot attacks) and restarted.
What am I missing?
I'm not in the business... I *am* the business.
(Score: 2, Funny) by Anonymous Coward on Wednesday December 09 2015, @03:04PM
You ask "What am I missing?". I'm inclined to say "a tinfoil cap".
(Score: 2, Funny) by Anonymous Coward on Wednesday December 09 2015, @04:00PM
Don't accept a tinfoil cap. Demand unlimited tinfoil.
(Score: 1, Touché) by Anonymous Coward on Wednesday December 09 2015, @03:20PM
Life, since you seem to have excess free time.
(Score: 2, Informative) by Anonymous Coward on Wednesday December 09 2015, @03:39PM
What am I missing?
Well, if you're only using ASCII codes 65-127 I'd say you're missing numbers, lots of punctuation, and the very important '<' & '>' that identify html tags.
(Score: 0) by Anonymous Coward on Thursday December 10 2015, @03:59AM
(Score: 5, Funny) by GreatAuntAnesthesia on Wednesday December 09 2015, @03:40PM
> What am I missing?
I implanted a miniature webcam in your dog.
(Score: 0) by Anonymous Coward on Wednesday December 09 2015, @03:41PM
Ctrl+F; Faraday
0 matches
I hope you enjoy getting infected across that air-gap!
(Score: 1) by jimtheowl on Wednesday December 09 2015, @04:04PM
"What am I missing?"
You're using bash.
;)
(Score: 4, Funny) by FatPhil on Wednesday December 09 2015, @04:17PM
Comedic subtlety
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
(Score: 2) by Gravis on Wednesday December 09 2015, @04:20PM
I use adblock. uBlock. Privacy Badger. CatBlock. Ghostery. Tor. NoScript. And a bunch of other privacy guard plugins you probably never heard of.
I browse the web using a chrooted jail (inside a one-time use, stripped-down, throwaway OpenBSD VM) with an automated, scripted combination of WWW::Mechanize, curl, netcat, wget, 'strings,' and eLinks. I use a variety of increasingly specific HTML parsers to guarantee valid HTML, strip all tags, remove javascript, hyperlinks to one-pixel GIF trackers, inlined ad content, and references to Donald Trump.
...
What am I missing?
probably, your medication because that is overkill. disabling flash and installing uBlock and Privacy Badger is enough to get the job done.
(Score: 2) by LoRdTAW on Wednesday December 09 2015, @10:06PM
Humor eludes you.
(Score: 2) by HiThere on Wednesday December 09 2015, @11:52PM
To be fair, there wasn't that much humor there to be found.
Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
(Score: 2) by xav on Thursday December 10 2015, @12:31AM
At last ! We have finally found the last user of the Mosaic web browser.