by Elad Sharf - Senior Security Research, Websense Labs - Wednesday, 7 March 2012.Websense has detected a new wave of mass-injections of a well-known rogue antivirus campaign. The majority of targets are Web sites hosted by the WordPress content management system.
At the time of writing, more than 200,000 Web pages have been compromised, amounting to close to 30,000 unique Web sites (hosts). The injection hijacks visitors to the compromised sites and redirects them to rogue AV sites that at...
tempt to trick them into downloading and installing a Trojan onto their computer.
The injected code is very short and is placed at the bottom of the page:
After a three-level redirection chain, victims land on a fake AV site. In this example, the first chain is the ".rr.nu", and the landing site is the ".de.lv" top-level domain, but the landing site keeps changing.
The rogue AV site appears to perform a scan on the computer and scares the user by displaying fake malware detections of Trojans. The page looks like a Windows Explorer window.
The fake scanning process looks like a normal Windows application, however, it is only a pop-up window within the browser. The fake antivirus then prompts visitors to download and run their "antivirus tool" to remove the supposedly found Trojans. The executable is itself the Trojan.
More than 85% of the compromised sites are in the United States, while visitors to these web sites are more geographically dispersed. While the attack is specific to the US, everyone is at risk when visiting these compromised pages.