Categories: Cyber CrimeMalware

YouTube ads network serving Caphaw Banking Trojan

YouTube users were targeted by a classic drive-by download attack by exploiting client Java software vulnerabilities and serving Caphaw Banking Trojan.

What about using YouTube to spread malware? YouTube is a video-sharing website on which users can upload, view and share videos, it has great appeal to the users and represents one of the bastions of the Internet. The website was visited by more than one billion of unique visitors, one billion of potential victims in case of a malware-based attack.

Security experts at Bromium Labs discovered that YouTube advertising network has been abused by attackers to spread malicious code, in particular, they have discovered that YouTube In-Stream Ads were redirecting users to malicious websites. At time I’m writing it is still not clear the number of victims of the attack that abused of YouTube service.

Victims were hijacked to websites controlled by attackers that were hosting the Styx Exploit Kit and was exploiting Java client side vulnerabilities by drive-by-download attack. The experts revealed that the attack allowed the installation on victim’s PC of the Caphaw Banking Trojan. The attackers exploited the Java vulnerability (CVE-2013-2460) to infect victims, interesting to note that malware is able to detect the specific Java version installed on the user’s machine and based upon it is able to serve the suitable exploit.

“We noticed the malware tries to detect the version of Java installed and based on the version, it sends out different URLs to ensure that the exploit is compatible with the Java versions. This is a signature of the Styx Exploit kit.”

“We don’t yet know the exact bypass which the attackers used to evade Google’s internal advertisement security checks. Google has informed us that they’re conducting a full investigation of this abuse and will take appropriate measures.” researchers said.

Once again lack of efficient patch management is cause of serious problem, Oracle in fact has already patched the exploited Java vulnerability last year, but infected users haven’t updated their software.

The attack scenario is composed of the following phases:
  • Step 1: User watches a YouTube video
  • Step 2: User sees a thumbnail of another video (*.JPG)
  • Step 3: User clicks on the thumbnail and watches the video. In the background the user gets redirected to a malicious ad served by Googleads (*.doubleclick.net)
  • Step 4: Malware redirects the user to ‘foulpapers.com’
  • Step 5: Foulpapers.com iframes the aecua.nl
  • Step 6: aecua.nl delivers the exploit (in our case it was Styx exploit kit)

 

The server used to spread the Caphaw Banking Malware is located in Europe and malware authors implemented Generation Algorithm (DGA)  technique for communicating with Command and Control server (C&C).
Domain generation algorithm (DGA) algorithms are used by many malware to periodically generate a large number of domain names where criminals host Command & Control servers.
“It uses a DGA (Domain Generation Algorithm) for CnC, we’re still digging into the various IP addresses leveraged.” reports the official post from Bromium Labs.

Google, which owns YouTube, has already taken down the malvertisment campaign and it is investigating on the attach to prevent future offensives.

Let’s remind that a similar attack was detected last month, in that case the attackers abused for Yahoo adv network.

Watering hole attacks are clearly getting popular by attackers. Recently, Yahoo mail users were attacked using similar vectors. Several high-profile websites have become victims of such attacks recently. From the attackers point of view, this is the easiest way to cause maximum damage – max ROI.”

Pierluigi Paganini

(Security Affairs –  YouTube, watering hole attack)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

5 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

12 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

12 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

18 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

1 day ago

This website uses cookies.