Author Topic: Another of the js.js blackhole landing sites...not detected by avast?  (Read 2041 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33913
  • malware fighter
See: http://urlquery.net/report.php?id=191396
See: https://www.virustotal.com/url/4419494d1912c261490105c0dc2b4b08c3ff200456d6a3758ff0ca65f57da13e/analysis/1348173165/
See: https://www.virustotal.com/file/c8a842d6e31d26abfdb095c17b50abd3c13a37e81a0ecada28b9d7aed2b122f2/analysis/1348173167/
The general pattern here has long been reported to virus AT avast dot com by !Donovan & polonus,
IDS alert: EXPLOIT-KIT Blackhole Redirection to generated folder - js.js
document location redirect to: htxp://69.194.192.203/links/deep_recover-result.php (a blacklisted domain and 100/100n malicious),
see: http://zulu.zscaler.com/submission/show/2b470729cc759123341522f462d7dbd9-1348173584

polonus
« Last Edit: September 20, 2012, 10:41:59 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline mchain

  • Avast Evangelist
  • Ultra Poster
  • ***
  • Posts: 5639
  • Spartan Warrior
Re: Another of the js.js blackhole landing sites...not detected by avast?
« Reply #1 on: September 20, 2012, 10:39:16 PM »
@ polonus,

If one does not run java, is a user protected somewhat from infection?  Java always seems to have problems staying up to date.
Windows 10 Home 64-bit 22H2 Avast Premier Security version 24.1.6099 (build 24.1.88821.762)  UI version 1.0.797
 UI version 1.0.788.  Windows 11 Home 23H2 - Windows 11 Pro 23H2 Avast Premier Security version 24.2.6105 (build 24.1.8918.827) UI version 1.0.801

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33913
  • malware fighter
Re: Another of the js.js blackhole landing sites...not detected by avast?
« Reply #2 on: September 20, 2012, 10:59:24 PM »
Hi mchain,

In general terms yes, most exploit kits have exploits for adobe, flash and outdated java versions or even zero-days as just recently. As avast officially is not fond of recommending to uninstall java, some here feel strongly about this like essexboy and others. But java is not the only culprit of a lot of malware misery, also malicious javascript used here, like other scripts could be seen as at the root of the majority of infections. So the user of a browser is well protected with a script blocker, like NoScript in fx or similar protection in Google Chrome, together with the Kiss Privacy extension. Blackhole kit uses a ready made mix of the most succesful methods to infect the browser of those by redirecting to a so-called blackhole landing site.
And yes, some evil tongues have it that java coders need the odd flaw to be assured of new support contracts as java is found up everywhere, but I think that is a joke. But jokes aside, I hope they come up with some good new security strategy, like with a good sandbox to keep the code in line. But with a lot of code in software there are a lot of lines of codes and a lot of possible bugs. E.g. Win 7 has so many lines of code that there must be room for thousands and thousands of bugs, as fuzzers are running on a daily basis, some are bound to be found up and hopefully fixed before being abused,

polonus
« Last Edit: September 20, 2012, 11:02:41 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33913
  • malware fighter
Re: Another of the js.js blackhole landing sites...not detected by avast?
« Reply #3 on: September 24, 2012, 04:07:15 PM »
Another one fitting these specifics: http://urlquery.net/report.php?id=196886
Detected here: http://zulu.zscaler.com/submission/show/fb346c2d32f0b5bee3a8df72422ab148-1348494827
here avast does not detect: https://www.virustotal.com/file/67da4062f8cb296602ae8f4191049f45ff12da7fafe0789e909f342930dc86e8/analysis/1348426640/
landing at a Frameset but I get a 4.01 Frameset....landing at dsparking dot com see: http://www.mywot.com/en/scorecard/dsparking.com?utm_source=addon&utm_content=popup-donuts- site has 4 exploits - Tracking Cookies: 319 cookies created when visiting other websites. Approximate chance of getting a dsparking.com cookie when browsing the Internet: 0.16%(info cookiecert)

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!