Tuesday, January 25, 2011

Massive Blackhat SEO Malware Campaign Launched

"Do not blame the Soviet Union had thousands of such care, the body for small medical gas cents, even if he is especially the fear, if allowed to spread this poison out of stock"

On January 23rd, thousands of machine generated attack sites were registered through GoDaddy via DNSPod name servers.  These sites generally include a name of 5 characters in length, and utilize the .info TLD.  The sites combine black hat SEO poisoning with virulent malware infections.  At least one anti-virus vendor has labeled the infections as "not disinfectable".

The structure of these sites take two forms.  The attack sites utilize a technique known as wild card DNS.  This enables an infinite number of subdomains to be created for a single domain name.  Sites like pgkqy.info, which I will refer to as the hounds, contain over 6000 links to the attack sites.  The hounds' content (6000 links) consists of 200 links to the subdomains of 30 different attack domains (note http://doc.emergingthreats.net/bin/viewfile/Main/RussianBusinessNetwork?rev=1;filename=hounds_to_the_hunters.txt).  The hounds' large number of links serve to boost the search engine rankings of the attack sites. 

The attack sites themselves are littered with keywords and phrases designed to poison search engine results, and lure the unwary.  These include references to celebrity sex scandals, teenage sex, and so forth.  The attack sites also contain machine generated text consisting of numerous paragraph length narratives (in English and Mandarin). Inserted among these narratives are out of context messages, which resemble coded messages.  Might the following be a reference to Iranian oil?:

"Since no increase, and that this spirit of building the base fluid, the patriarch will be purchased by the Shaw and the next war"

Regardless, the malware payload appears quite ominous on its own.  One of the sites distributing malware to the visitors of the attack sites (code1.2bj.cc) has previously distributed malware deemed "exact, not disinfectable" by F-Prot.  In that incident, anti-virus detection rates were approximately 50%:

Antivir                    TR/Agent.DT  
Avast                     Win32:Trojan-gen  
Bit Defender           Trojan.Agent.DT  
ClamAV                 Trojan.Agent-298  
DrWeb                   Trojan.PWS.Htool  
F-Prot                    W32/Trojan.CXF (exact, not disinfectable)  
F-Secure Anti-Virus           Trojan.Win32.Agent.dt  
Ikarus                    Trojan.Win32.Agent  
Kaspersky Anti-Virus         Trojan.Win32.Agent.dt  
McAfee VirusScan             potentially unwanted program Generic HTool  
Panda Anti-Virus               Trj/Agent.AMJ  
Sophos                Troj/HTool-B  
Symantec Command Line Scanner         Trojan Horse  
VBScan               Trojan.Agent.HPVY  
VirusBlokAda       Trojan.Win32.Agent.dt

Sites serving malware to the attack sites have been highly successful in separate campaigns over the past 90-days.  A sampling of Google Safe Browsing reveals results like the following:

tpjt.info:
Over the past 90 days, tpjt.info appeared to function as an intermediary for the infection of 254 site(s)
coooog.com:
Malicious software includes 143 exploit(s).
Over the past 90 days, coooog.com appeared to function as an intermediary for the infection of 371 site(s)

In the case of attack site 175.bctjd.info, network activity included:

Requests
URL    Status    Content Type
http://175.bctjd.info     200    text/html
http://175.bctjd.info/tj400.js     404    text/javascript
http://175.bctjd.info/tj.js     200    text/javascript
http://js.users.51.la/4440802.js     200    text/javascript
http://175.bctjd.info/1.js     200    text/javascript
http://tpjt.info/bs003/?9865     200    text/html
http://vip.coooog.com:8080/f/cpv.asp?adid=4207&uid=11228     200    text/javascript
http://122.226.223.149:8080/coo/uploadfile/20110114110108277.swf     200    application/x-shockwave-flash
about:blank     200    text/html
http://s6.cnzz.com/stat.php?id=1583556&web_id=1583556     200    text/javascript
http://vip.coooog.com:8080/f/mt.js     200    text/javascript
http://tpjt.info/skins/orange/images/style.css     200    text/javascript
http://tpjt.info/liaotian/cjtc.js     200    application/x-javascript
http://74.207.249.234/liaotian2/     200    text/html
http://74.207.249.234/liaotian1/flash/novie.swf     200    application/x-shockwave-flash
http://74.207.249.234/liaotian2/img/ChatShow.js     200    application/x-javascript
http://74.207.249.234/liaotian1/f1ash/16.swf     404    text/html
http://www.blogkou.com/f1ash/11.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/3.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/6.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/5.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/4.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/7.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/8.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/9.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/2.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/13.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/12.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/15.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/1.swf     200    application/x-shockwave-flash
http://74.207.249.234/liaotian2/img/ip.js     200    text/javascript
http://fw.qq.com:80/ipaddress     200    text/javascript
http://js.users.51.la/4429735.js     200    text/javascript
http://cpm.ad123456.com/m.js     200    text/javascript
http://tpjt.info/1.js     200    text/javascript
http://images.sohu.com/cs/jsfile/js/lu.js     200    text/javascript
http://js.star8.net/code.js     200    text/javascript
http://js.users.51.la/4192183.js     200    text/javascript
http://js.users.51.la/4397946.js     200    text/javascript
http://js.users.51.la/4392080.js     200    text/javascript
http://js.users.51.la/4286690.js     200    text/javascript
http://vip.coooog.com:8080/gotocpvv.asp?id=11228&adid=2105&Vfc=38333831333132383131313438313534&tid=11295&url=http://tpjt.info/bs003/?9865     500    text/html
http://lu.sogou.com/kwd?pid=meilalala&ct=kwd&fmt=h_kwd&dn=8&iw=728&ih=15&fs=12&c_bo=ffffff&c_bg=ffffff&c_fg=ff0000&tdw=&charset=gb2312&ti=QVOD%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1,%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1,QVOD%E7%94%B5%E5%BD%B1,%E5%BF%AB%E6%92%AD%E7%94%B5%E5%BD%B1,%E4%BC%A6%E7%90%86%E7%89%87,%E5%BF%AB%E6%92%AD%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1-%E5%9C%A8%E7%BA%BF%E5%85%8D%E8%B4%B9%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1%E7%BD%91&ref=http://tpjt.info/bs003/?9865&sohuurl=http://tpjt.info/bs003/?9865     200    text/html
http://code1.2bj.cc:8899/click.html?adid=687&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=687&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=687&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=687&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://code1.2bj.cc:8899/click.html?adid=551&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=551&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=551&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=551&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://pic.2bj.cn/upload/wz823/55/950x90.files/2.js     200    application/x-javascript
http://code1.2bj.cc:8899/click.html?adid=675&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=675&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=675&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=675&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://c.star8.net/c1.ashx?ln=1&w=314261&sid=0&logo=true&e=OR8cNc5cKsA3Zk8bA2zB4PEV5be4MdCu4ZolkxB8r4c6mTNwRdD3UQ==&ar2s=1&furl=http://tpjt.info/bs003/?9865&ffurl=http://tpjt.info/bs003/?9865     200    text/html
http://sougoudaima.soua.com/101105/950x220/950x220.html?uid=2234     200    text/html
http://code.soua.com/js/common.js     200    text/javascript
http://code.soua.com/js/word.js     200    application/x-javascript
http://code1.2bj.cc:8899/click.html?adid=311&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=311&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=311&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=311&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://pic.2bj.cn/upload/wz425/950_90_5_files/js.js     200    text/javascript
http://pic.2bj.cn/upload/wz425/950_90_5_files/279.css     200    text/javascript
In addition, numerous ActiveX controls were invoked.

The sites have been deployed throughout HostNOC.  Hound site pgkqy.info is at 173.212.238.77, while attack sites vdjiv.info and bbzfc.info reside at 173.212.238.76.  However, both hound site dsqof.info and attack site bjpwn.info are at 184.82.9.206.  All are utilizing f1g1ns1.dnspod.net as a DNS server.
We will pinpoint more hostile IP addresses as time permits.  You can pursue further investigation with the use of this file: http://doc.emergingthreats.net/bin/viewfile/Main/RussianBusinessNetwork?rev=1;filename=includes_skynet.txt.


James McQuaid
1-25-2011