Analysis of password-strength page at unwrongest website (split from password thread)

Discussion in 'malware problems & news' started by Sully, Jul 21, 2010.

Thread Status:
Not open for further replies.
  1. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    fox.gif

    Also used FF

    snaz1.gif

    snaz2.gif

    snaz3.gif

    Hope he gets it sorted soon.

    You're right to question, i've clarified this post ;)
     
    Last edited: Jul 31, 2010
  2. wat0114

    wat0114 Guest

    Well there's no need for people to merrily click away oblivious of the consequences.
     

    Attached Files:

  3. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    If I understood what Rmus showed it would also help explain why I saw nothing. I don't have any adobe products, including the reader on board.
     
  4. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Thanks for the reply. I figured it was, but still thought it wise to check with others. :)
     
  5. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    I don't have Adobe Reader either, but you know the warnings I have been getting. I think you seeing nothing is more a function of the malware being based on geoIP, as Vlk stated.
     
  6. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    You are probably right. I think this thread has been an eye opener, on many levels.
     
  7. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    I agree. I know I have learned quite a bit, on many levels, as you noted. :)
     
  8. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    While this seems very sophisticated, it's really just another plateau in the evolution of complex malware that began at least five years ago.

    Back then, security analysts used the term "unicode" for obfuscating (disquising) the real code:

    Hackers, Scammers Hide Malicious JavaScript On Web Sites
    October 20, 2005 02:45 PM
    http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml?articleID=172302840
    Here is an example from that time:

    http://www.urs2.net/rsj/computing/tests/postcards/

    One of the HTML files that is cached selects the exploit based on the version of Windows and the IE browser. The actual code:

    Code:
    // launching exploit which number is depends on Windows and IE versions
    function Get_Win_Version(IE_vers)
       
         if (IE_vers.indexOf('Windows 95') != -1) return "95"
         else if (IE_vers.indexOf('Windows NT 4') != -1) return "NT"
         else if (IE_vers.indexOf('Win 9x 4.9') != -1) return "ME"
         else if (IE_vers.indexOf('Windows 98') != -1) return "98"
         else if (IE_vers.indexOf('Windows NT 5.0') != -1) return "2K"
         else if (IE_vers.indexOf('Windows NT 5.1') != -1) return "XP"
         else if (IE_vers.indexOf('Windows NT 5.2') != -1) return "2K3"
    This is a forerunner of the Exploit Kit which serves up malware to exploit vulnerabilities in different browsers and other applications.

    Postcards even checks for the presence of certain AV:

    Code:
     if ((fNortonAV==0)&&(fMcAfee==0))
     { ExploitNumber=3; } 
         else
         { ExploitNumber=2; }
    I mention a bit of history because it's easy to get caught up in the sensational aspects of remote code execution attacks and lose sight of the easy ways these attacks are thwarted from running their executable payloads.

    I mentioned in a previous TDSS thread that for all of the sophistication of malware exploits, they still depend on the 2 tried and proven methods of attack. Marco of Prevx responds.

    https://www.wilderssecurity.com/showthread.php?t=265297
    So, no matter the sophistication of the code, it still has to get a malware executable onto the system.

    ----
    rich
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.