Difference between revisions of "DBSA:2014-0001"
m |
m |
||
(One intermediate revision by the same user not shown) | |||
Line 14: | Line 14: | ||
'''Last Modified:''' {{REVISIONTIMESTAMP}} by {{REVISIONUSER}} | '''Last Modified:''' {{REVISIONTIMESTAMP}} by {{REVISIONUSER}} | ||
− | '''Who should take note:''' | + | '''Who should take note:''' Everyone |
==Classification== | ==Classification== | ||
Line 31: | Line 31: | ||
==Description== | ==Description== | ||
− | Yahoo! (herein written "Yahoo") has an advertisement platform in which itself uses to provide itself and other sites revenue from advertisements. Recently Yahoo had their advertisement platform compromised and was serving malicious code along with malware in a mass-infection attempt of thousands of systems who may load the bad advertisements. | + | Yahoo! (herein written "Yahoo") has an advertisement platform in which itself uses to provide itself and other sites revenue from advertisements. Recently Yahoo had their advertisement platform compromised and was serving malicious code along with botnet malware in a mass-infection attempt of thousands of systems who may load the bad advertisements. |
The malware and malicious code would have originated from "ads.yahoo.com" and be provided by iframes to the following resources: | The malware and malicious code would have originated from "ads.yahoo.com" and be provided by iframes to the following resources: |
Latest revision as of 06:17, 6 January 2014
Disclaimer: as technology changes, advisories may become out of date or may no longer be relevant, please refer to the "Date" section of the header to be sure the advisory is recent as pertains to your situation.
Contents
Digibase Security Advisory - Yahoo! Advertisement Network Compromise
Keywords: Yahoo, compromise, Yahoo!, malware, Magnitude Exploit, Java
DBSA ID: 2014-0001
Regarding: Yahoo! Advertisement Network Compromise
Writeup: Kradorex Xeron (talk) 05:58, 6 January 2014 (EST)
Date: 2014 01 06
Last Modified: 20140106061756 by Kradorex Xeron
Who should take note: Everyone
Classification
Priority: HIGH
Rationale: Users must take action to ensure their computers have not been compromised.
Severity: MODERATE
Rationale: Systems with adequate security solutions should be able to filter out most of the issue, however there is still risk that new malware may be being delivered.
Spread of Issue: MULTI-PLATFORM HIGH
Rationale: All users who access Yahoo! associated sites or sites that utilize Yahoo Advertisements are potentially affected as this exploit utilizes a potentially cross-platform mechanism involving Java.
Description
Yahoo! (herein written "Yahoo") has an advertisement platform in which itself uses to provide itself and other sites revenue from advertisements. Recently Yahoo had their advertisement platform compromised and was serving malicious code along with botnet malware in a mass-infection attempt of thousands of systems who may load the bad advertisements.
The malware and malicious code would have originated from "ads.yahoo.com" and be provided by iframes to the following resources:
- blistartoncom.org (192.133.137.59), registered on 1 Jan 2014
- slaptonitkons.net (192.133.137.100), registered on 1 Jan 2014
- original-filmsonline.com (192.133.137.63)
- funnyboobsonline.org (192.133.137.247)
- yagerass.org (192.133.137.56)
Credit for this list: Fox-IT
These resources then proceed to load further resources ultimately resulting in a compromise if the Java-related exploit involved is successful.
Mitigation/Solution
Users are strongly advised to remove Java plugins from their browsers and scan their systems ensuring no out-of-place software has been installed and monitor their systems for unauthorised activity. Due to Java's track record users should not utilize it as a browser plugin, Java can operate without being installed as a plug-in for locally installed games and tools. Note that Java is different from Javascript.
Users are also advised to utilize care and caution while accessing web resources, this includes having up-to-date anti-malware and anti-virus solutions along with being careful when a site provides a download without provokation or asks to install software to view content.
It may be prudent to insert the listed domains names into ad blocking blacklists or web filtering solutions to prevent loading of any content from said domains (possibly including ads.yahoo.com to prevent future incidents).