Friday 23 December 2011

Hackers infected the Amnesty International’s UK site with Malware

Researchers @ Barracuda Labs reported Amnesty International’s UK website(hxxp://www[.]amnesty[.]org[.]uk) has been compromised and is serving drive-by downloads. From the research the site was compromised on or before Friday, December 16.
The site loads hxxp://3max[.]com[.]br/cgi-bin/ai/ai.html via an iframe. "3max.com.br" is a legitimate but compromised Brazilian automotive website, loads malicious Java content (stolen from the Metasploit project), which targets CVE-2011-3544. If the exploit is successful, malware is installed on the visitor’s system.

The experts say that the attack on the human rights group may be an attempt to spy on activists.

"The exploit payload possesses properties of targeted malware but is being served by an exploit of a popular, public website. The working theory for this anomaly relates to Amnesty International as a human rights non-governmental organization. To explain, certain countries use zero day exploits and other techniques to gain electronic information about the activities of human rights activists. Of course, a subset of these activists are too smart to click on links in even well-worded spearphishing emails. But what if you compromised a website frequented by these activists (e.g., Amnesty International)? Then your targets come to you. The context-specific damage potential is significant." said in the post.

Details of Vulnerability Targeted by the Exploit
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544

VirusTotal Detections for Exploit
http://www.virustotal.com/file-scan/report.html?id=1cc214cee10f02d37359c0e3d04fd57899333c4b1eaa81489c74e5c2fa17c3a8-1324068153

VirusTotal Detections for Exploit Payload
http://www.virustotal.com/file-scan/report.html?id=0e53832e1c36d34a3d05c05f73ebab22a74ade95c5f3b7d9f74fad4f56d10023-1324067892

Related Posts Plugin for WordPress, Blogger...
Back to TOP