How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible Dancho Danchev I’ll try to answer to these questions.

On numerous occasion I remarked the need to carefully observe the evolution of the underground market to identify dangerous trends that can leave portend a new wave of cyber crimes. The increasing availability of free, commercial availability of mass Web site hacking tools, the lack of proper security configurations and the inefficiency of defense systems is allowing cybercrime to monetize the compromise process.

Today cybercriminals could  easily find vulnerable websites using commercial available DIY hacking tool based on Google Dorks and use many other tools to exploit known vulnerabilities in the targeted hosts. In the recent months security firms have detected numerous attacks on global scale against forum and blogging platforms.

Once infected a host could be recruited as part of a botnet to conduct DDoS attacks or could be used to serve a malware, last discovery of Danchev is an iFramed based traffic E-shops and the offer of access to hijacked legitimate traffic to be later on converted to malware-infected hosts.

There are numerous methods for monetizing managing a portion of hijacked Web traffic, through of blackhat SEO (search engine optimization), DNS cache poisoning, RFI (Remote File Inclusion) or spam/phishing campaigns tactics traffic is sold and resold to achieve criminals purposes.

iFramed based Traffic EshopiFramed based Traffic Eshop

 

Using IFrame tag, the attackers inject malicious links (link to compromised host that serve malware) using Cross site Scripting in popular websites.  Visiting a page containing the iFrame tag the user is redirected to a website that serve a malware.

Using Iframe Injection hackers perform different operations, including the injection of advertisements inside any other websites, the insertion of malware infected site links and redirection to malware infected sites.

In an IFrame Injection Attack hackers are able to include the webpage one pixel square (victim is not able to see it in webpage), they also obfuscate the JavaScript that will run automatically from that included page so that it looks something like %6C%20%66%72%61%6D%65%62%6F deceiving the victims.

The iFramed based traffic E-shop offers 5000 visits for $15, 50,000 visits for $100 and 100,000 visits for $175 but very interesting is the possibility to acquire geolocated traffic consisting of American, French, British and Canadian visitors, a feature very attractive for cybercriminals.

The iFramed based traffic E-shop according Danchev opens up two possibilities for abuse:

  • Directly embedding exploits and malware serving from URLs – cybercriminals could hide client-side exploit serving URLs in the form of iFrame on the hacked websites. Cybercriminals could infect with these techniques visitors of websites serving malicious payload.
  • ‘Visual social engineering’ campaigns displayed on Adult Web sites – a typical campaign could take advantage of the same ‘instant action provoking’ visual social engineering campaigns that are typical for PUA (Potentially Unwanted Application) campaigns, in the context of featuring appealing ads mimicking popular products, demanding urgent reaction, or promising a reward for clicking on them.

Curious that despite the iFramed based traffic E-shop is pitching itself as a “legitimate traffic service”, it’s also explicitly emphasizing on the fact that iFramed based traffic is perfectly suitable to be used for Web malware exploitation kits.

The iFramed based traffic E-shop of course accepts Bitcoin as payment method.

Pierluigi Paganini

(Security Affairs –  iFramed based traffic, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

3 hours ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

8 hours ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

1 day ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

2 days ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

2 days ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

2 days ago