Knowledge Base::DBSA:2014-0001

From Digibase Knowledge Base
Revision as of 06:17, 6 January 2014 by Kradorex Xeron (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Disclaimer: as technology changes, advisories may become out of date or may no longer be relevant, please refer to the "Date" section of the header to be sure the advisory is recent as pertains to your situation.

Contents

Digibase Security Advisory - Yahoo! Advertisement Network Compromise

Keywords: Yahoo, compromise, Yahoo!, malware, Magnitude Exploit, Java

DBSA ID: 2014-0001

Regarding: Yahoo! Advertisement Network Compromise

Writeup: Kradorex Xeron (talk) 05:58, 6 January 2014 (EST)

Date: 2014 01 06

Last Modified: 20140106061756 by Kradorex Xeron

Who should take note: Everyone

Classification

Priority: HIGH

Rationale: Users must take action to ensure their computers have not been compromised.

Severity: MODERATE

Rationale: Systems with adequate security solutions should be able to filter out most of the issue, however there is still risk that new malware may be being delivered.

Spread of Issue: MULTI-PLATFORM HIGH

Rationale: All users who access Yahoo! associated sites or sites that utilize Yahoo Advertisements are potentially affected as this exploit utilizes a potentially cross-platform mechanism involving Java.

Description

Yahoo! (herein written "Yahoo") has an advertisement platform in which itself uses to provide itself and other sites revenue from advertisements. Recently Yahoo had their advertisement platform compromised and was serving malicious code along with botnet malware in a mass-infection attempt of thousands of systems who may load the bad advertisements.

The malware and malicious code would have originated from "ads.yahoo.com" and be provided by iframes to the following resources:

  • blistartoncom.org (192.133.137.59), registered on 1 Jan 2014
  • slaptonitkons.net (192.133.137.100), registered on 1 Jan 2014
  • original-filmsonline.com (192.133.137.63)
  • funnyboobsonline.org (192.133.137.247)
  • yagerass.org (192.133.137.56)

Credit for this list: Fox-IT

These resources then proceed to load further resources ultimately resulting in a compromise if the Java-related exploit involved is successful.

Mitigation/Solution

Users are strongly advised to remove Java plugins from their browsers and scan their systems ensuring no out-of-place software has been installed and monitor their systems for unauthorised activity. Due to Java's track record users should not utilize it as a browser plugin, Java can operate without being installed as a plug-in for locally installed games and tools. Note that Java is different from Javascript.

Users are also advised to utilize care and caution while accessing web resources, this includes having up-to-date anti-malware and anti-virus solutions along with being careful when a site provides a download without provokation or asks to install software to view content.

It may be prudent to insert the listed domains names into ad blocking blacklists or web filtering solutions to prevent loading of any content from said domains (possibly including ads.yahoo.com to prevent future incidents).

References

Personal tools