Friday, March 18, 2011

Facebook Likejacking attack 3

Another Likejacking found on Facebook a minute ago...
I found the below post from my news feed and the play image seems suspicious.

After clicking the link from the facebook post, it will be redirected to the below site:
  • http://video25.info/pan/
I'm not going to explain how it works but if you need details, the technique is the same as my previous blog.

The below shows how many users that were tricked by this attack as of this writing. And it continue to increase every refresh of the page.

If you suspect you've been infected by this attack, just go with the below link and click the UNLIKE button (note: If there's no UNLIKE button, DO NOT CLICK THE LIKE BUTTON)

Tuesday, March 15, 2011

Autorun Malware Protection for Win7

My mistake that I haven't updated the previous blog on Autorun Malware Protection which is not applicable in Windows 7. So I decided to create another write up about it.

Below is the steps on how to totally disable the Auto Play feature of Windows 7.

1. Open the Local Group Policy Edit via the below instructions:
1.1 Click Start or Hold windows key from keyboard and press R
1.2 Then type gpedit.msc

2. A window will show up and browse the below items from the left side of the Local Group Policy Editor window:
2.1 Computer Configuration
-> Administrative Templates
-> Windows Components
-> Autoplay Policies
2.3 At the right side, you can see settings about the Autoplay policies same as below:

Figure A. gpedit.msc

3. Enable each one of the settings from the Autoplay policies and set it the same as the below:

Figure B. Turn off Autoplay
Figure C. Don't set always

Figure D. Turn off Autoplay for non volume devices

Figure E. Default Behavior

4. After the above mentioned settings, close the Local Group Policy Editor window.
5. Then go to Control Panel
6. Click on the Hardware and Sound
7. Click on the AutoPlay
8. Uncheck the Use AutoPlay for all media and devices
9. Then set all possible fields to Take no action same as below:

Figure F. Take no action

Note: This will disable the Autoplay on all media type devices. This is also needed to be disabled because there are malwares that tries to infect media type such as CDs, DVDs and etc.

If you find problems with the step by step instructions. Just let me know.

Sunday, March 13, 2011

Japanese Tsunami event used in Likejacking Attack

We all know what happened to Japan last friday and almost everyone is being curious and wanted to see pictures, videos and etc about the event.

While browsing my Facebook, I've seen the below post from my news feed.
Figure A. FB Post

I click the link from the above Facebook post and found the below site which is very suspicious.
  • http://spinavideo.com/

Figure B. The site

Then I started to analyze...... and I found out that this is another Facebook likejacking.....

Again, the same technique as before, it uses a hidden iframe to hide the liking of page...
Figure C. Hidden iframe

Then it contains code to make the hidden iframe follow the mouse where ever it goes so that once the user clicks the fake play image, the user will like the page without the user consent.

Figure D. Mouse event


As of this writing, the below shows the total likes of the site which means the total number of users were tricked by the site.
Figure E. The likes

If you think you were tricked by this site, just visit the below link and UNLIKE the page (Note: if you're not seeing the Unlike button just leave the page and DO NOT CLICK THE LIKE BUTTON):

Be aware about these kind of attacks. Well, there are ways to identify if the site is suspicious specially in this site (Figure B). As you can see the site contains Youtube logo but it is not actually the Youtube website, from that point you should know that it may cause you trouble when you continue browsing the page.

Thursday, March 10, 2011

DHL Delivery Notification

I received an email from DHL saying that a parcel was sent to my home address and it includes an attachment which a malicious executable. If you also receive this email, please delete the email immediately or report to your Security Vendor. Below is the example of the Spam mail:

Figure A. The Mail


This kind of attack becomes popular these past year where the email address used to be the legitimate domain like example from Figure A, it uses infofuiwzuo@dhl.com which the user may believe that is actually from a DHL specially if the user who receives this email attack really waiting for a parcel from DHL.

Based on the message of the email, the attached file is a document. The truth is, it is an executable file that uses a PDF icon as shown in Figure B to fake the user that it is really a document. This is effective when the file extension is hidden. One problem is that hidden file extension is the default settings of Windows. So most users that uses this default settings has a high chance to be vulnerable in this Social Engineering attack.

Figure B. The Icon


File Information:
Filename: DHL_notification.exe
File size: 35,328 bytes
MD5: 64901CFDFB576D7C7C1D4F1F240315E2
SHA-1: B6C5A7D097CDCC9B71B010C7CFCEDDE6D0616E3F

File behavior:
Upon Execution it drops a copy of itself as the below filename:
%Application Data%\Adobe\AdobeUtil.exe

It attempts to create the below folders if does not exist:
%Application Data%\Adobe
%Application Data%\Adobe\plugs
%Application Data%\Adobe\shed

It also attempts to drop the below files:
%Application Data%\Adobe\AdobeUtil .exe
%Application Data%\Adobe\adb.cer

It attempts to create a shortcut of the copy of itself to Windows startup folder which serves as its Automatic execution technique:
%Startup Folder%\AdbUpd.lnk

Note: %Startup Folder% is usually %User's Folder%\Start Menu\Programs\Startup

It tries to download and execute the files from the below URLs:
http://62.122.73.203/548.exe - ThreatExpert File Analysis
http://d34ghqarfrgad.com/ftp/ftpplug2.dll
http://d34ghqarfrgad.com/lol.exe
http://erherg34gsafwe.com/ftp/base.bin


Tuesday, March 8, 2011

Another Facebook Likejacking Attack

This will be fast, if you're not familiar with Facebook likejacking, please see my previous blog about it.

Just now, I found another site which have the facebook likejacking attack. Below is the screenshot of the site as of this writing (Figure A).

Website: http://video.findisuper.com/lol-dieser-frau-kann-man-keinen-wunsch-abschlagen/

Figue A. The Site

Well, the same technique used from my previous blog that contains code to make the hidden iframe follow the mouse pointer Below is the code.

Figure B. Mouse Event

The interesting part is instead of using the Facebook like plugin that is usually used from the previous likejacking attack that I know, in this site, it uses a script from Facebook and a certain Facebook API

Facebook Like Plugin (previously used):
http://www.facebook.com/plugins/like.php?href=

It uses the below code to have a hidden iframe which points to fbLike.html

Figure C. Hidden Iframe

The below code from fbLike.html shows the liking of page GUI in a different way (instead of Facebook Like Plugin). This will be hidden from the site because it is loaded via hidden iframe ( from Figure C).

Figure D. fbLike.html

I believe they are doing this new approach to avoid detection from Security Softwares because basically, the Facebook Like plugin is easy to detect that when it is hidden and added some additional filter, it can be tagged as malicious. But this time, since it doesn't use the Facebook Like plugin, I believe it will not be detected.

Once a facebook user has been attacked by this likejacking, A message on the user's facebook wall will be posted that the user likes the page, example below:
Figure E. User's wall

If you suspect you've been infected by this attack, just go with the below link and click the UNLIKE button (note: If there's no UNLIKE button, DO NOT CLICK THE LIKE BUTTON)


When I started this blog the users that liked the page as below:
Upon finishing the blog, see the below stat:

Thanks for reading. ^_^

Friday, March 4, 2011

Facebook Likejacking attack

It’s been a while since I updated this blog. I’ve been busy in the past year so for now, I’m still finding a time to make one. ^_^

I want to share with you about the likejacking attack on Facebook. Basically, the likejacking is not new. It was publicly disclosed a long time ago maybe a year or so. I noticed that most likejacking attacks are not blocked by Security companies.

First what is likejacking?

Likejacking is a malicious technique of tricking users of a website into posting a Facebook status update for a site they did not intentionally mean to "like."[1]

The term "likejacking" came from a comment posted by Corey Ballou[2] in the article How to "Like" Anything on the Web (Safely), which is one of the first documented postings explaining the possibility of malicious activity regarding Facebook's "like" button.[3]

~According to Wikipedia - http://en.wikipedia.org/wiki/Likejacking


And here is the example that I found today……….

I found the below post from my Facebook news feed.

Figure A

Clicking the link will open a new browser and go to the site miley-respect.info. When I analyzed the site, it contains code that several redirections takes place as below:

http://miley-respect.info -redirects_to- http://www.omg-girl.info/ -redirects_to- http://www.omg-girl.info/ -redirects_to- http://jerrynoob.info/np

Well if we think deeply there are several possible reasons why they are doing this kind of redirection chain.

1. Easy to change the end point of the attack.

2. Not easy to track if you only got the end point or before the end point domain.

3. And there’s much more… haha.

Then after the redirections and as of this writing, it will end up to the site http://jerrynoob.info/np

Below is the screenshot of the site.

Figure B

It is basically spoofing the Youtube. But that’s not it. What the users don’t know is the hidden agenda of this page. It has a hidden iframe that is not seen on the page using the below code:


If you’re not aware of this code, it basically hide the liking page of facebook example it hides the below gui:

Figure C

You will notice that this is not seen on the page (Figure A). The interesting part is the strategy use on how the user will like the page without knowing it. With regards the hidden iframe, it also contains code that the hidden iframe will follow the mouse pointer wherever it goes on the page. With this, since the user is aiming to watch the video, the user will just click the video play image and that makes clicking the hidden facebook like button (Figure C). Below is the code that does the trick on following the mouse pointer.


Moreover, after liking the site without knowing it there will be a new post on your Facebook news feed that you liked the page.

Figure D

In this case, your friends that saw the post that you liked the page may become interested and will do the same thing and get infected. This is like a WORM attack in Facebook that people get infected without their consent.

Well, that’s not all. After liking it there will be a popup of some kind a verification before viewing the video. As below.

Figure E

Well, most of these verifications end up getting your mobile phone number which may lead to a service subscription that charges your mobile account for money and the bad thing about it is it’s hard to unsubscribe which causes loss of money.

Figure F

This mobile subscription is legal, but as you can see, users finding it in a malicious way. So beware!

Another interesting part is after finishing this blog, there are more and more users liking it, yes that's means more and more facebook users are getting infected. As you can see in Figure C, when I started writing, it only has 2,619 likes. And now go on look below:

Figure G

Let see how it goes.

I believe there's more into this attack that myself is missing. Well, as of now, this is all I have.

BTW, If you think you are infected by this FB likejacking and want to remove the Facebook post from your news feed, go to the below URLs and click the Unlike button (Note: if you're not seeing the Unlike button just leave the page and DO NOT CLICK THE LIKE BUTTON):

http://www.facebook.com/plugins/like.php?href=http://miley-respect.info&layout=standard&show_faces=false&width=450&action=like&font=tahoma&colorscheme=light&height=80

http://www.facebook.com/plugins/like.php?href=http://jerrynoob.info/np/&layout=standard&show_faces=false&width=450&action=like&font=tahoma&colorscheme=light&height=80


Thanks for reading. ^_^


====================================
Update - March 4, 2011 4:58 AM PST
See below, after couple of hours more and more FB users were infected.....

====================================
Update - March 4, 2011 4:45 PM PST
See below, again more and more FB users getting infected.....
====================================
Update - March 5, 2011 2:45 AM PST
See below, Sigh... more and more FB users getting infected.....
====================================
Update - March 5, 2011 1:18 PM PST
No need to worry about it anymore, the site is now blocked by Facebok.
Thank you for sharing this blog with your friends and for your comments. ^_^