Dwindling Spiral: The increasingly degraded practices of Adult Friend Finder

As a follow-up to my recent post about AFF, we now see them using video hard core porn to lure more subscribers.

Aff123812312312388

While AFF has allegedly used fake pictures of porn stars in the past to promote their site, this is a video clip of hard core porn that plays as an ad — something that is new.

And AFF is getting aggressive on subscriber acquisition, which they’ve made clear to their affiliates:

Reminder: Medley is giving an extra $20,000 to the affiliates with the biggest signup increase for the last two weeks of November (Nov 18 – Dec 1) vs the first two weeks (Nov 4 – Nov 17th). All FriendFinder affiliates with accounts older than one month are eligible. Signup increases will be measured by combined signups on Adult FriendFinder, Cams.com, ALT.com, OutPersonals.com, FriendFinder.com, and our newest hit: MillionaireMate.com. The top increasing affiliate will receive $10k, the 2nd place affiliate $2k, and the next 8 affiliates will each receive $1k.

But we’re not done yet. We are running a 10% bonus for November. To qualify, all you need to do is earn more in November than you did in September and October (which ever had the highest daily average earnings) and we’ll add 10% to your November earnings.*

I hope the alleged buyer of AFF knows what they’re getting into….

Alex Eckelberry
(Thanks, Patrick Jordan)

Four new rogue antispyware programs

4 new rogues of the SpywareNo/Spysheriff/MalwareAlarm Family

1. Site:dr-protection(dot)com
Listed in the CounterSpy database as DrProtection

2. Site: guard-center(dot)com
Listed in the CounterSpy database as GuardCenter

3. Site: liveantispy(dot)com
Listed in the CounterSpy database as LiveAntiSpy

4. Site: online-guard(dot)net
Listed in the CounterSpy database as OnlineGuard

Patrick Jordan
Sunbelt Software Malware Research

Another reason why Firefox really is safer than IE

Not the first time I’ve noticed this — IE 7 is really behind on tagging phish. It’s a real shame, too — I know people on the IE team, and I know they mean well and work hard. But something’s not working right in the system. And IE 7 certainly needs the protection with the amount of users running it.

Same phish, at the same time:

IEfoxphis123788

Firefoxphis123788

And in IE 7, if you want to report a web forgery, you have to go through a two-step process and an incredibly painful CAPTCHA (which even I stumble over when trying to enter):

Truringw3421348

I know why Microsoft is slower than Firefox in tagging websites — they have to be more careful with showing a site as bad with the market share they have. But I believe that a few false positives is well worth the benefits of saving people from phishing and fraudulent websites.

Microsoft — Go for it. Be aggressive.

(And yes, I know this is a completely unscientific observation.)

Alex Eckelberry

Porn back on ca.gov site? Oh, this is not good

Update 11/29: As of this evening, the links are gone. All clear… that was fast.

Update 12/1: As of the morning of 12/1, the porn links are back.

Update 12/1: As of 4 pm EDT, the porn links are gone. I’m getting tired of checking this.

Remember that incident a while back where we discovered massive amounts of porn hosted by the Transportation Authority of Marin? It resulted in a federal shutdown of the entire state’s Internet and email service.

Incredibly, it’s back. Same site, same everything. Take a look at this Google search result (thumbnailed due to offensive content):

Cagovporn123888

Clicking those links lands you to a page which pushes a fake codec (malware):

Zlobfake1238881238888888

So, does this mean that the feds will shutdown teh internets again?

Alex Eckelberry
(thanks Patrick Jordan)

HEADS UP: More Google poisoning on the way?

Google has removed the sites responsible for the recent massive Google poisoning attack.

However, we’re seeing indications that another attack may be on the way. We have seen another spate of websites freshly registered, using the similar .cn domains. There seem to be two different groups here.

As an example, a simple search of “funny drunk quote site:cn” pulls up the following results:

Suspiciouslinks12388

Notice the pattern? Large amount of fresh .cn domains, with numbered html pages.

However, there are apparently two different groups at work here. One we’ll call Type 1 — which appears to be the same group involved in the prior poisoning. And the other, we’ll call Type 2 (sorry, not very original, but we’re working fast here).

Funnydrunkscreenm123988

Type 1 shows this style of page, and it looks like it’s coming from the same group that was involved in the recent Google poisining:

Page123jjdsfasdfpp

On exiting the page, you get pushed to install Spy-shredder, a rogue antispyware program.

Spyshredderwer183123

Which, even if “cancel” is pressed, you still get a fake scanning page.

Nothing unusual there.

Aspyshredderwer183123

(You can see an example page source of Type 1 by looking at this dump.)

Type 2 is different, and simply shows users a site which is trying to generate traffic (for the purposes of getting affiliate commissions):

Page29123888888

Again, freshly registered stuff. You can see an example page source of Type 2 by looking at this dump.

Right now, we’re not seeing either site serve exploits, as we saw in the last attack. However, this could change.

Alex Eckelberry and Adam Thomas

New fake codec — Windows and Mac — codechq

A new fake codec: codechq(dot)net.

Pushes both Windows and Mac TrojanDNSChanger. Sample binaries: Mac: codechq(dot)net/download/codechq(dot)dmg; Windows: codechq(dot)net/download/codechq(dot)exe. If you are hunting for Mac fake codecs, remember to change your user agent to a Mac. And please — don’t touch these binaries unless you know what you’re doing, as they are live Trojans.

Alex Eckelberry
(Thanks Bharath)

More on the massive SEO poisoning — it was targeted at Google. And it was more crafty than we thought.

As a follow-up to our recent posts, here’s some additional information.

First, we can ring the all-clear bell. Google took action on these domains and you won’t find them anymore in Google.

However, check out this javascript:

(source: cxsjrkelgvjs(dot)cn/gopnikovnet(dot)js << malware site)

Jssearch123888

So. if you use search terms like “inurl” and “site”, you won’t see these malware pages in your results. Clever, since that’s one way for malware researchers to find stuff (I recently wrote an article on this subject for VirusBulletin). And, it only cares if you’re coming from Google.

Quite interesting.

Alex Eckelberry
(Thanks to Sunbelt researchers Adam Thomas and Francesco Benedini)

New trend? Gromozon being installed as a rogue security app

Here’s a first — the Italian Gromozon, one of the nastiest pieces of malware in creation, being pushed in disguised form as a rogue antispyware security app.

Gro123988812381823818881

Gr1238818238888881231

(This same page also installs Malwarealarm, but through a different file.)

Incidentally, it’s also the first time we’ve seen Gromozon not being delivered through exploit but through social engineering.

VirusTotal results here.

Alex Eckelberry
(Credit to Sunbelt researcher Francesco Benedini)

Malware redirects: The aftermath

Hi all, Adam Thomas here from the Malware Research Team. I just wanted to post a follow up to our blog post yesterday regarding malware redirects from search engine results.

Sunbelt Software has uncovered tens of thousands of individual pages that have been meticulously created with the goal of obtaining high search engine ranking. Just about any search term you can think of can be found in these pages.

For example, the image below shows one page that focuses heavily on searches including the word “infinity”.

Search_example1

This example shows hundreds of search terms for “hospice”. Pretty sick.

Search_example2

For months now, our Research Team has monitored a network of bots whose sole purpose is to post spam links and relevant keywords into online forms (typically comment forms and bulletin board forums). This network, combined with thousands of pages such as the two seen above, have given the attackers very good (if not top) search engine position for various search terms.

In our previous post, we mentioned that the malicious pages also contained an IFRAME link which would attempt to exploit vulnerable systems. If you were unlucky enough to run across one of these links while surfing with a vulnerable system, you would become infected with a family of malware that we call Scam.Iwin. With Scam.Iwin, the victim’s computer is used to generate income for the attacker in a pay-per-click affiliate program by transmitting false clicks to the attacker’s URLs without the user’s knowledge. The infected Scam.Iwin files are not ordinarily visible to the user. The files are executed and run silently in the background when the user starts the computer and/or connects to the internet.

Scam.Iwin is also used to load malware for other groups. In this case, one of those malware groups is known to have been associated with the infamous RBN (Russia Business Network).

Links loaded by Scam.Iwin:

Exploits

So far we have observed the following malware being installed:

Trojan.Crypt.XPACK.Gen
Trojan-Downloader.Small.AAGX
Trojan-Downloader.Win32.Agent.ev
Trojan-Downloader.Win32.Agent.bnm
Trojan-Downloader.Win32.Agent.eus
Trojan-Downloader.Gen
Trojan-Downloader.Win32.Obfuscated.n
Trojan-Downloader.Win32.Small.ddx
Trojan-Downloader.Win32.Small.cib
Trojan-Proxy.Win32.Xorpix.Fam
Trojan.DNSChanger.Gen
Trojan.Win32.Patched.q
Trojan.Rawlam.C
Trojan.FakeAlert
Trojan.SpamThru (Spam-Bot)
Trojan.Netview (Information Stealer)
Trojan-Downloader.Win32.BHO.bt
Trojan.Win32.Pakes.bqt
Scam.Iwin
Dialer.Win32.GBDialer.i (v)
Backdoor.Rustock (spam-bot)
Trojan.Srizbi
Trojan-PWS.Win32.Bzub.gen (Information stealer)
Backdoor.Win32.Small.lu (Information Stealer)
Awola (Rogue Security Program)
Ultimate SecuritySuite (Rogue Security Program)

If your system was not vulnerable (i.e. your system is fully up-to-date with the latest patches), and you were duped into installing the “ActiveX Upgrade”, then you might simply be left with a toolbar installed into Internet Explorer as well as some pesky pop-up advertising for Rogue Security Software.

Of course, the team over at Google has been notified of this. Other search engine companies are welcome to contact us for more information.

Oh, what a tangled web we do weave . . .

Adam

BREAKING: Massive amounts of malware redirects in searches

We’re seeing a large amount of seeded search results which lead to malware sites.

These are using common, innocent terms — one researcher landed on a malware site through searching for alternate firmware for a router.

For example, this search for “netgear ProSafe DD-WRT” yields these results:

Search11238888888

That site, luewusxrijke(dot)cn/769(dot)html, redirects to another site which pushes a fake codec (malware) and attempts to exploit vulnerable system:

Zold1238888

This IFRAME leads to additional malware installs:

These malware distributors are using keywords to lure people into their sites (some example search terms here — PDF).

Some more examples, on innocent search terms.

Mallinks1238888

Mallinks2238888

Mallinks3238888

Clicking on these links will expose the user to exploits which will infect a vulnerable system (in other words, a system that is not fully up-to-date with the latest patches).

Alex Eckelberry
(Thanks Adam Thomas)

Another new fake codec — Windows and Mac

A new fake codec: codecvip(dot)com.

Pushes both Windows and Mac TrojanDNSChanger.

Sample binaries: Mac: codecvip(dot)com/download/codecvip(dot)dmg; Windows: codecvip(dot)com/download/codecvip(dot)exe. If you are hunting for Mac fake codecs, remember to change your user agent to a Mac. And please — don’t touch these binaries unless you know what you’re doing, as they are live Trojans.

Alex Eckelberry
(Thanks Bharath)

A clarification

Paul Andreason made a comment about Adult Friend Finder (AFF) that has been misconstrued by a large number of folks, resulting in some hate mail. This was exacerbated by a subsequent blog post I made about AFF, where I pointed out comment spam (not his). In the screen shot (since changed), Paul’s comment was next to the comment spammers — possibly leading people to believe he was on the side of AFF.

Paul does not support AFF in the any way. As he puts it, “I was trying to point out that money was the reason they did that, and that morals and money don’t coexist in today’s world.”

Hopefully that sorts things out and he stops getting hate mail 😉

Alex Eckelberry

Here’s a turkey for you: Another fake codec site

Ultrahq123888

Pushes both Windows and Mac TrojanDNSChanger.

Sample binaries: Mac: ultrahqcodec(dot)com/download/playcodec1123(dot)dmg; Windows: ultrahqcodec(dot)com/download/playcodec1123(dot)exe. If you are hunting for Mac fake codecs, remember to change your user agent to a Mac. And please — don’t touch these binaries unless you know what you’re doing, as they are live Trojans.

Alex Eckelberry
(Thanks Adam Thomas)

Irony: Truly, they have no shame

My recent blog post on Adult Friend Finder, critical of the company’s spamming methods, attracted some attention: Of a comment spammer.

Aff13881238

Apparently from an affiliate, the Adult Friend Finder link points to medimenia.com and the hompage link points to ourfriendfinder.com. I’ve edited the links so that they are no longer live — why help these slimeballs?

Alex Eckelberry

Why I need to up my life insurance plan

Sandy, in our sales department, is pursuing his dream of becoming a helicopter pilot.

Unfortunately for us, he has taken to buzzing the Sunbelt building during his training sessions. Waving happily as he goes by, we all sit mute in terror as this neophyte pilot flies by.

Sandy12988

Dan, our webmaster, took a shot of Sandy doing a fly-by.

Pray for us.

Alex Eckelberry

Example of a money transfer scam site: usps-mailcorp

Usps-mailcorp.com_moneytransferscams

Other sites on the same IP one might consider avoiding are:

Cigs4you.info 
D101b.com 
Estrel-logistics.com 
Fethard-best.com 
Fresh-film.net 
Gp-eurocapital.com 
Hack-off.info 
Ihos.info 
Intway587.com 
Lskdfjlerjvm.com 
Media-content.biz 
Online-traffeng.com 
Pin-l-games.com 
Piterseo.com 
Prestra.com 
Prestra.net 
Qadro.net 
Qwert285.com 
Referatoff.info 
Serbitoname.info 
Serd158.com 
Trafagon.net 
Unistream-shipping.com 
Usps-mailcorp.com 
Vermont-trust.com 
Xolodilnikov.net 

Patrick Jordan