TA13-141A: Washington, DC Radio Station Web Site Compromises

News

Extraordinary Robot
News Feed
#1
Original release date: May 20, 2013 | Last revised: May 21, 2013
[h=3]Systems Affected[/h]
  • Microsoft Windows systems running Adobe Reader, Acrobat, or Oracle Java
[h=3]Overview[/h] On May 16, 2013, US-CERT was notified that both www.federalnewsradio[.]com and www.wtop[.]com had been compromised to redirect Internet Explorer users to an exploit kit. As of May 17, 2013, US-CERT analysis confirms that no malicious code remains on either site.
[h=3]Description[/h] The compromised websites were modified to contain a hidden iframe referencing a JavaScript file on a dynamic-DNS host. The file returned from this site was identified as the Fiesta Exploit Kit. The exploit kit script uses one of several known vulnerabilities to attempt to download an executable:

Any systems visiting running vulnerable versions of Adobe Reader or Acrobat or Oracle Java may have been compromised.
[h=3]Impact[/h] The exploit kit, once successful, delivers and executes a known variant of the ZeroAccess Trojan. Additionally, according to open source reporting, the malware also downloads and installs a variant of FakeAV/Kazy malware.
The ZeroAccess Trojan attempts to beacon to one of two hardcoded command-and-control addresses, 194[.]165[.]17[.]3 and 209[.]68[.]32[.]176. The beaconing occurs using an HTTP GET using the Opera/10 user-agent string.
After beaconing, the malware then downloads a custom Microsoft Cabinet file and the malware uses port UDP/16464 to connect to the peer-to-peer network. This cabinet file contains several lists of IP addresses, as well as a fake flash installer.
[h=3]Solution[/h] Apply Updates

Identify Infected Systems

Monitor activity to the following IPs as a potential indicator of infection where permitted and practical:

  • 209.68.32.176
  • 194.165.17.3
[h=3]References[/h]
[h=3]Revision History[/h]
  • Initial release
[HR][/HR] This product is provided subject to this Notification and this Privacy & Use policy.



Syndicated from the United States Security Readiness Team (US-CERT). More...
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.