The official website of a prominent Israel-based, Middle East foreign policy-focused think tank, theJerusalem Center for Public Affairs (JCPA), has been compromised and abused by attackers to distribute malware.
The Israeli think tank website JCPA – an independent research institute focusing on Israeli security, regional diplomacy and international law – was serving the Sweet Orange exploit kit via drive-by downloads to push malware onto the computers of the website's visitors by exploiting software vulnerabilities, researchers from security firm Cyphort reported on Friday.
The Sweet Orange is one of the most recently released web malware exploitation kits, available for sale at selected invite-only cyber crime friendly communities and has been around for quite some time. However, Sweet Orange has also disappeared but in October 2013, shortly after the arrest of Paunch, the author of BlackHole, experts observed a major increase in the use of Sweet Orange.
The analysis carried out by Cyphort security firm indicates that the attack on JCPA website is part of a wide malware campaign. It has been discovering several infected website on daily bases and found an initial redirection server as a common thread between the attacks.
Following the initial redirection server, Cyphort notes that the innocent users from music industry and law firms are being redirected to a link in the infection chain. Ultimately, users are led to an exploit server located in Russia.
“This is a sinkhole that is connected to many such varying domain names,” explains McEnroe Navaraj of Cyphort. “All of these names have some string of ‘cdn’ in them. Once the bad actors get access to an account/server they can just create a corresponding ‘cdn’ domain entry under that domain and use it to point to the target exploit server.”
This method allows an attacker to bypass a lot of the URL categorization and URL blacklisting technologies.
The JCPA website’s homepage is infected with a malicious Jquery JavaScript file. The Jquery JavaScript file receives an exploit kit server URL from another domain,
“cdn[dot]jameswoodwardmusic[dot]com.”
Ultimately, the exploits are served from
“cdn3[dot]thecritico[dot]com:16122/clickheat/stargalaxy.php?nebua=3.”
Finally, the user is attacked via a series of Java and Internet Explorer exploits that were used to deliver an information-stealing Trojan dubbed Qbot.
“The final dropper is downloaded in encrypted form and decrypted in-memory (key: investor) and written to disk,” Navaraj explains. “This exploit kit served two (Qbot) binaries with same hash (MD5: 4ff506fe8b390478524477503a76f91a). Encrypted binary transfer is done to hide it from signature-based network security devices such as IPS or AV gateways.”