Author Topic: An exploit kit drop here?  (Read 1707 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34054
  • malware fighter
An exploit kit drop here?
« on: March 06, 2016, 10:46:12 PM »
See: https://www.virustotal.com/en/url/f1c9b2b0f31bfb0bead1d70bb88d3d2f5375881cadea3126817a636121796c4d/analysis/1457299544/
Quttera Labs - domain is Malicious.
"The malware entry is cached and may not reflect the current status of the domain".
Consider: -/ka/216/%E1%83%97%E1%83%90%E1%83%95%E1%83%AF%E1%83%93%E1%83%9D%E1%83%9B%E1%83%90%E1%83%A0%E1%83%94
Link with outdated software: -http://edu.gba.ge/events-2/%E1%83%A2%E1%83%A0%E1%83%94%E1%83%9C%E1%83%98%E1%83%9C%E1%83%92%E1%83%98/

See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fgba.ge%2Fka%2Fgallery%2F

Blacklisted link: -http://edu.gba.ge/events-2/%e1%83%a2%e1%83%a0%e1%83%94%e1%83%9c%e1%83%98%e1%83%9c%e1%83%92%e1%83%98/ ->
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fedu.gba.ge%2Fevents-2%2F%25e1%2583%25a2%25e1%2583%25a0%25e1%2583%2594%25e1%2583%259c%25e1%2583%2598%25e1%2583%259c%25e1%2583%2592%25e1%2583%2598%2F

Detected libraries:
jquery - 1.8.3 : (active1) -http://gba.ge/skins/default/js/jquery.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-ui-dialog - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
jquery-ui-autocomplete - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
jquery-ui-tooltip - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: high
http://bugs.jqueryui.com/ticket/8859
(active) - the library was also found to be active by running code
3 vulnerable libraries detected
HTTP Server: Apache HTTP Server
PHP Version: 5.2.17 (Outdated)
Instant Cloud server: http://toolbar.netcraft.com/site_report/?url=www.gba.ge%2F -> poor community ratings:
https://www.mywot.com/en/scorecard/proservice.ge?utm_source=addon&utm_content=rw-viewsc

Stealth and missing Name Servers: http://www.dnsinspect.com/gba.ge/1457300456

polonus
« Last Edit: March 06, 2016, 10:50:28 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34054
  • malware fighter
Re: An exploit kit drop here?
« Reply #1 on: March 06, 2016, 10:56:59 PM »
At the root of all this is the WordPress insecurity at this website, let's have a look:
WordPress Version
2.22
Version does not appear to be latest 4.4.2 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

revslider   
g1-social-icons   
simple-social-share 1.0   latest release (3.0) Update required
http://perials.com
g1-gmaps   
eventON   
contact-form-7 4.1.1   latest release (4.4) Update required
http://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

Warning User Enumeration is possible  :o
The first two user ID's were tested to determine if user enumeration is possible.

ID   User   Login
1   edu. gba   cache
2   None   tiko
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Compromised sites will often contain embedded iframes that can also deliver malicious code to visitors of the web site. Check any discovered iframes and ensure they are legitimate.

-//www.facebook.com/plugins/likebox.php?href=https%3A%2F%2Fwww.facebook.com%2FGBAtrainingcenter&width=965&height=258&colorscheme=light&show_faces=true&header=false&stream=false&show_border=false&appId=275291799245613  seems OK here.

XSS Dom issues for this link: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.facebook.com%2Fplugins%2Flikebox.php%3Fhref%3Dhttps%253A%252F%252Fwww.facebook.com%252FGBAtrainingcenter%26width%3D965%26height%3D258%26colorscheme%3Dlight%26show_faces%3Dtrue%26header%3Dfalse%26stream%3Dfalse%26show_border%3Dfalse%26appId%3D275291799245613
landing at: -Results from scanning URL: https://static.xx.fbcdn.net/rsrc.php/v2/yq/r/0wM5s1Khldu.js
Number of sources found: 66
Number of sinks found: 20

This here seems 100 % OK - A-Status all = same origin: https://sritest.io/#report/58993912-57ac-402d-ad89-a709874ff27d

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34054
  • malware fighter
Re: An exploit kit drop here?
« Reply #2 on: March 06, 2016, 11:28:59 PM »
Seems VT does not have any threat detection listed. The vulnerability of the site remains however.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!