OFFICIAL SECURITY BLOG

AskMen.com compromised again

July 18, 2014 | BY

Last month, security firm Websense reported that popular website AskMen.com was compromised to serve malicious code.

Today, our honeypot captured an attack coming from AskMen.com in what appears to have been malicious code injected in their server:

malicious_injection

This piece of code creates an iframe:

i_frame

That is what is used to do a redirection to a malicious site:

1stredir

We can see a function that performs a rot13 to prepare the URL:

rot_13

This URL is a landing page for the Nuclear EK:

landing

Finally the following payload is dropped and executed: 7d1f6a2a767b32c7f8c2743464cba8bc. Malwarebytes Anti-Malware detects it as Trojan.Kelihos.

Here is the full traffic workflow:

hxxp://www.askmen.com/top_10/dating/top-10-white-rappers.html
hxxp://static.isltest.net/pop2.php?acc=%BF%EFW%A1%D8pO%16%923%BF%BA%28%86%ED%C7%9CVK%88%DF%A2%F6c&nrk=7661155079
hxxp://870e992ddjffaz.topsamurai.co.vu/
hxxp://1806393499-6.topsamurai.co.vu/1405652160.swf
hxxp://1806393499-6.topsamurai.co.vu/1405652160.pdf
hxxp://1806393499-6.topsamurai.co.vu/1405652160.jar
hxxp://1806393499-6.topsamurai.co.vu/f/1405652160/2
hxxp://1806393499-6.topsamurai.co.vu/f/1405652160/2/2

and Fiddler capture:

fiddler

Our free Malwarebytes Anti-Exploit blocked this threat:

blocked

We notified AskMen.com and they promptly replied that they were looking into the matter immediately.

If you are interested in the files / network captures, feel free to get in touch.

@jeromesegura