Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: InfoSec Handlers Diary Blog - part II InfoSec Handlers Diary Blog

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free! part II

Published: 2007-11-09
Last Updated: 2007-11-11 01:57:16 UTC
by Mark Hofman (Version: 2)
0 comment(s)


The list of infected device is still growing we're now at 66K links in Google for the scripts, will it get to the 200K plus numbers we saw with the Super Bowl? has now been confirmed as containing malicious content, and you can add to the list which also belongs to the same group. 

From the whois records it looks like the domain is refreshed daily, which tends to indicate that they are not paying for it, but are using a registrar where you can start using the domain immediately, but pay later.  In this case the pay later part is probably not happening.  If I were the registrar I might get miffed with people registering the same domain on a daily basis and never pay, but then that's me.   

If you like IP numbers then today the IPs to block for your web users are &

Nov 9

As handlers we tend to have a tiny stubborn streak, no really, we are, just ask our respective partners, they’ll confirm it.   So in the fine tradition of "I wonder what else is going on" I dug a little bit further. 

The more I looked the more familiar it seemed.  Remember the Super Bowl infection back in February?  Mass defacement, using SQL Injection, downloading a file (although almost everything does that nowadays),  script is #.js, etc.   It all sounded a bit the same.  So was there a link?

Seems there might be at that.   There are various sites that will let you have a look and see what other sites are or were hosted on a particular IP address.  The address that points at shows that other web sites hosted on the same server as are:

  • ·
  • ·
  • ·

A quick google will show you that  and  were used in the Super Bowl defacements.  The warcraft site might be legit, but so far it is three against one on the server. 

When you look at the title of the site you will find a reference to the domain (remember ANI?)

Following the yellow brick road on  you end up adding to the counter hosted in the domain, strangely familiar from both the Super Bowl and ANI issues earlier this year.    So it would seem that there may be a link.

The good news so far is that the executable being downloaded seems to be detected by most AV products.  The sad news is that when I checked the other day the number of infected sites was about 30K and now about 52K sites.

If you use URL blockers in your organisation, then you may want to block the four domains and your users will be protected for at least the next little while.


Mark  H - Shearwater

0 comment(s)
Diary Archives