Brian was looking for more information on the plane involved in the recent death of the President of Poland, a plane known as a "TU-154" called a "Careless" by NATO. When he did his Google search:
nine of the top ten hits he got back were links to pages containing malware. He tells his own version of the story in his article Hackers exploit Polish President's death with scareware attack. Now, even three days later, several of the top Google results still are pointing to malware sites, including:
We passed Brian's request for research to our Malware Analysis group, led by UAB Computer & Information Sciences Masters student, Brian Tanner, who was able to give a quick response to the request - having a strong understanding of what was going on in the first thirty minutes, including identifying a high school website in North Alabama that had been compromised to help distribute the malware! Others joined Brian in the analysis to provide more details.
These sites are running extreme SEO malware - Search Engine Optimization pages which function by building "news headline" sites designed to achieve top Google ranks. For instance, Google is currently indexing 741 unique news headlines pointing off the InnerProductsGroup website, most are current news headlines or "hot searches" such as:
mine rescue teams
mine rescue chambers
frank lucas wife
new york times crossword answers
mega piranha trailer
nbc news brian williams
kristen stewart budapest
tupolev 154 cockpit
the katyn massacre movie
national katyn massacre movie
jack johnson tour dates usa 2010
spartacus episode 12
Remax.com Homes For Sale Houston
Here's an example from that list - a search for "Kristen Stewart Budapest" shows three malware pages in the top ten results on Google, in positions #4, #7, and #9 for me, but only one of the three is currently properly labeled as "This Site May Harm Your Computer"
What happens if you visit one of these sites? It launches a malware installation of a part that we call "Fake AV" malware. Let me start by showing you what one of these LOOKS like:
Clicking OK results in a web page that appears to be doing a Virus Scan.
The AV, which was really a web page, then says it needs to be updated, and offers an update for you to install.
Running that one actually does install the Fake AV product.
After installing the Fake AV, many imaginary viruses on your computer are "detected", and you are asked if you would like to "Remove All".
Choosing "Remove All" prompts you for credit card information, offering several purchase plans ranging from $49.95 to $89.95 for a "lifetime" Fake AV product.
If you decide not to complete the transaction, you will be bugged relentlessly with pop-ups like these.
Sounds scary, doesn't it? The industry calls this type of malware "Scareware". Its going to keep trying to make you believe that the only way to keep your machine safe is to give the criminal your credit card information.
Last June, the US Government's Federal Trade Commission fined one of these Scareware vendors $1.9 Million for selling more than 1 million copies of his fake anti-virus software! That's proof that people really do get victimized by this software! I experienced some of James Reno and Innovative Marketing's software first hand when I visited a hotel in San Diego last year. The Business Office computers were all "protected" with one of their fake anti-virus software packages.
There's big money in Fake AV, which is why the current gang continues so diligently even after seeing one of their fellows fined $1.9 Million!
If you've been scammed by these criminals, be sure to file a complaint! I recommend complaining to the FBI's Internet Crime & Complaint Center (ic3.gov). Because of the FTC's previous involvement with Fake AV, you might also want to file your complaint there using their FTC Complaint Assistant.
While neither of these complaint forms is ideally suited for dealing with a Fake AV product, both do offer the opportunity to enter a free-form complaint towards the end of the process. Put as much descriptive detail as you can there.
(Watch FTC Video ScamWatch: How To File A Complaint.)
How does it work?
The sites that have been SEO optimized to show up in news headline and other popular searches act as redirectors. If you type the URL in directly, it forwards you to CNN.com. If you are REFERRED to the URL from Google, Yahoo, or Bing, you are redirected instead to the fake "scanner" page. That page will vary widely, but it started in our case above with a redirect to:
That first copy of the malware it installed, "packupdate_build8_195_2.exe" was only lightly detected. In a VirusTotal Report on this malware, only 8 out of 40 anti-virus products detected this software as malicious. Major products including ClamAV, F-Prot, Kaspersky, McAfee, Sophos, and Symantec did not report this software as malware.
We let the software run in the lab for a bit to see what computers it would connect to. Here's a partial list:
myfairland.com (188.8.131.52) - Sam Tam, UK
paymentsafety.net (184.108.40.206) - Ecatel, NL (nameserver = 220.127.116.11)
report.land-protection.com (18.104.22.168) - Sam Tam, UK
update1.winsystemupdates.com (22.214.171.124) - Vital Teknoloji, TR
report1.stat-mx.xorg.pl (126.96.36.199) - Vline, Ltd, Moscow
update2.winsystemupdates.com (188.8.131.52) Vital Teknoloji, TR
secure1.safepayzone.xorg.pl (184.108.40.206) Vital Teknoloji, TR
virtest.com (220.127.116.11) - Keyweb, RU - ICQ: 570352881 / email@example.com
invoiceerica.com (18.104.22.168) - ?? Bluesquare House, Berkshire, UK?
webpaybill.net (22.214.171.124) - NOC, Inc, Scranton, Pennsylvania
system-defender2010.com (126.96.36.199) - Artem Zhirkov, Russia
update1.savecompnow.com (188.8.131.52) Vital Teknoloji, TR
"virtest.com" is a service similar to Virus Total, only this one is clearly run to help criminals determine if there malware is detected or not. VirusTotal, run by white hat security researchers in Spain, shares details of submitted viruses with all participating anti-virus companies. VirTest is almost the opposite. As our friends at Damballa pointed out recently, VirTest charges money to scan your submitted malware and pledges anonymity and that your submissions will NEVER be shared with anti-virus vendors. Our infected computer constantly checked VirTest to see whether it was detected or not. After a while, the malware replaced itself with some new code that we found running from the location:
C:\Documents and Settings\All Users\Application Data\ea73a34\CUea73.exe /s /i /uid=195 /ls=6
That copy of the malware was only detected by 5 of 39 anti-virus products, according to this VirusTotal Report.
After this software ran, we noticed changes in our HOSTS file. All Google sites, for many different country codes, as well as Bing and Yahoo! search pages were being redirected via the HOSTS file to point to 184.108.40.206. That's on the Coloquest network in Arlington Heights, Illinois.
Many of the domains we linked to were hosted on common IP addresses with other domains, such as:
Several of those domains are registered to "Garritt Kooken" with Netherlands email address firstname.lastname@example.org, who strangely uses the Chinese telephone number +86.592257788 despite having a street address in India.
Mr. Kooken really likes to make fake AV product websites, and hosts many of them on Ecatel in the Netherlands, such as:
Looking at some IP Neighbors for computers our infected lab machine connected to, we find:
Looking at some "IP Neighbors":
Ecatel of the Netherlands (AS29073)
safety-payment.net - 220.127.116.11
safetypayment.net - 18.104.22.168
secures-guard.com - 22.214.171.124
systemmguard.com - 126.96.36.199
cleanupantivirus.com - 188.8.131.52
windowsguard-pro.com - 184.108.40.206
safeantivirus.net = 220.127.116.11
paymentsecurity.net = 18.104.22.168
secure.greywall.net = 22.214.171.124
on Vital Teknoloji in Turkey (AS44565)
update1.winsystemupdate.xorg.pl - 126.96.36.199
securemyfield.com - 188.8.131.52
newsystem-guard.com - 184.108.40.206
update1.winsystemupdates.com - 220.127.116.11
savecompnow.com - 18.104.22.168
newsystem-guard.net - 22.214.171.124
secure1.safetypayment.xorg.pl - 126.96.36.199
newsystemshield.net - 188.8.131.52
on Vline Ltd in Moscow (AS39150)
www3.tr-leech-kl.xorg.pl - 184.108.40.206
update2.sysupdate-n2.xorg.pl - 220.127.116.11
update2.sysupdt-n2.xorg.pl - 18.104.22.168
report1.stat-mx.xorgl.pl - 22.214.171.124
www1.free-scan-offer-nl.xorg.pl - 126.96.36.199
update1.sysupdate-n3.xorg.pl - 188.8.131.52
www1.best-free-scan-deal-k24.xorg.pl - 184.108.40.206
www1.best-free-scan-deal-nihob.xorg.pl - 220.127.116.11
Unfortunately this is just a drop in the bucket. This bad guy has 1800 domain names to his registration.
Our friend Dancho Danchev mentioned gkook in his series A Diverse Portfolio of Fake Security Software back in December.
A search at the excellent MalwareURL.com shows that this email address has been associated with this type of malware since at least October 9th, when "windows-pcdefender.com" was being reported.
Kimberly at Stop Malvertising did an excellent write-up showing this criminal poisoning searches for St Patrick's Day Celebrations.
She also reported back on December 1, 2009, that Tiger Woods SEO poisoning was leading to Fake AV products in this same group.