Just pulled up the page and my virus protector said it blocked a threat. Everything is fine now. Just wanted to point that out.
I just pulled it up again and it said threat was blocked. Under type it called it "blackhole" something-er-uver.
Antivirus blocked this nasty bug yesterday. Here is the scoop from the antivirus forums:
Symantec Warns: BlackHole toolkit is spreading like wildfire (Trojan.Carberp)
« on: 21. February 2011., 07:12:26 »
--------------------------------------------------------------------------------
Symantec has cautioned about the BlackHole toolkit, which has a powerful set of exploits and is spreading like wildfire. In a release issued on Monday, Symantec said that at present, it is the most prevalent exploit toolkit in the wild and can easily be compared with the likes of Neosploit and Phoenix in terms of the number of affected users.
Symantec recently reported the increasing utilization of sophisticated toolkits by criminals who would otherwise lack the technical expertise for cyber attacks, fueling a self-sustaining, profitable, and increasingly organized global economy.
Toolkits account for 61 per cent of all threat activity on malicious websites
In recent times, BlackHole has clearly emerged as the most used toolkit among hackers. The following IPS graph proves this fact, since more than 100,000 malicious hits are reported each day:
How BlackHole works:
· When victims visits a clean site that has been injected with a malicious iFrame, they are redirected to the BlackHole exploit kit server. BlackHole obfuscates the exploits for popular vulnerabilities such as PDF, JAVA, HCP, MDAC, etc.
· The page contains the code that redirects the user to download a malicious jar file. One of the classes inside the jar file extracts the value passed to it in the script, and then decodes it into a URL. This URL is then used to perform other malicious downloads.
· The URL downloads Trojan.Carberp, which is a highly sophisticated Trojan that is being compared to ZeuS because of its ingenious techniques for avoiding detection.
· The Trojan posts a unique ID to the command-and-control (C&C) server that will be used every time a transaction takes place between the Trojan and the C&C server. Next, the Trojan will post all of the running processes on the victim’s computer to the C&C server.
The Trojan then downloads three modules:
o stopav.plug – This module disables the antivirus installed on the victim’s computer.
o miniav.plug – Checks for the presence of other Trojans, such as Zeus, and if found, the Trojan deletes its competitor(s).
o passw.plug – It will log every username/password combination that is typed, as well as any URLs visited.
The C&C server sends the “multidownload” command to the Trojan:
o The first file downloaded is Trojan Hiloti (a.k.a. Trojan.Zefarch), which makes requests to a free file-hosting site.
o The second file downloaded (2.exe) is FakeAV
If you have a losing record at Reds games, please stop going.
I just pulled up the site and it blocked another threat. Here is what my AVG protection says:
Threat was blocked!
File name: 65.75.141.139/Home/index.php
Threat name: Exploit Blackhole Exploit Kit (type 2095)
I hope this helps.
Redszone is getting flagged by sopphos with every page navigated to....
"This isn’t stats vs scouts - this is stats and scouts working together, building an organization that blends the best of both worlds. This is the blueprint for how a baseball organization should be run. And, whether the baseball men of the 20th century like it or not, this is where baseball is going."---Dave Cameron, U.S.S. Mariner
Thanks, I'll open a ticket with our host.
Here's what our host had to say - honestly, I'm not sure where this leaves us, as I'm at a loss as to what direction to head next. If you have any suggestions, I'm all ears.
Hello,
I have scanned the server using RKhunter and couldn't find any malicious file from it.
---
[13:48:29] System checks summary
[13:48:29] =====================
[13:48:29]
[13:48:29] File properties checks...
[13:48:29] Required commands check failed
[13:48:29] Files checked: 135
[13:48:29] Suspect files: 6
[13:48:29]
[13:48:29] Rootkit checks...
[13:48:29] Rootkits checked : 248
[13:48:29] Possible rootkits: 0
[13:48:29]
[13:48:29] Applications checks...
[13:48:29] Applications checked: 9
[13:48:29] Suspect applications: 2
[13:48:29]
[13:48:29] The system checks took: 21 minutes and 23 seconds
[13:48:29]
[13:48:29] Info: End date is Mon Jan 16 13:48:29 EST 2012
---
I could see that the detected files are valid. I have scanned the "/home" folder using Clamscan. it also didn't detect any malicious file.
It only detected some mails which can be excluded.
---
[root@host ~]# tail test
----------- SCAN SUMMARY -----------
Known viruses: 1118387
Engine version: 0.97.1
Scanned directories: 1127
Scanned files: 70243
Infected files: 1323
Data scanned: 971.39 MB
Data read: 2921.17 MB (ratio 0.33:1)
Time: 573.856 sec (9 m 33 s)
[root@host ~]# grep -i found test > result
[root@host ~]#
[root@host ~]# cat result|grep -vi mail
[root@host ~]#
---
I have also scanned the website online. They also didn't detect any virus in the site "redszone.com". Please verify this using the following URLs.
---
http://www.avgthreatlabs.com/siterep...www.avg.com.au
http://www.urlvoid.com/
http://onlinelinkscan.com/
---
I could not find any malicious content in the server. Please let us know, if you need any further assistance.
Here's what we need from you guys that are affected by this issue:
Hello,
As we have already updated, our scan results are showing nothing suspicious in the web root. We could confirm this from the following on line scanner from AVG antivirus solutions.
--
http://www.avgthreatlabs.com/siterep...www.avg.com.au
--
Can you get back to us with any one of the URLs (specific URLs) that your clients see problematic ?
Could be coming from the ad's Boss. If that is the case, then it won't be on your server and won't be found.
No clue if there is anything to it, but it wouldn't be the first time that it has happened on the internet.
We have considered that possibility, but we've looked into it on the AdSense side and have not seen any substantiated reports that confirm it's the ads. Given how widespread AdSense is, you'd think there would be others with the same problem.
Regardless, we have temporarily eliminated ads from a couple of users that have reported malware warnings and we want to see what this does. If anyone else has received these warnings and would like to do a similar test, please send me a PM.
Even with the ads gone, I'm still getting threats almost every time I open the site.
Well, I've opened it a bunch today and it hasn't happened since this morning when I posted about it.
Board Moderators may, at their discretion and judgment, delete and/or edit any messages that violate any of the following guidelines: 1. Explicit references to alleged illegal or unlawful acts. 2. Graphic sexual descriptions. 3. Racial or ethnic slurs. 4. Use of edgy language (including masked profanity). 5. Direct personal attacks, flames, fights, trolling, baiting, name-calling, general nuisance, excessive player criticism or anything along those lines. 6. Posting spam. 7. Each person may have only one user account. It is fine to be critical here - that's what this board is for. But let's not beat a subject or a player to death, please. |