Fake Social Button Plugin Redirects to Angler EK

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Compromised websites remain one of the surefire ways to redirect innocent visitors to exploit kits. During the past few days we’ve started seeing an unusual route to the infamous Angler EK, notorious for leveraging hacked WordPress and Joomla CMSs.

This wasn’t via the common EITest or Darkleech paths nor was it a direct injection of the landing URL inside the compromised site’s source code.

Rather, this one uses a domain name used to lure website owners into thinking this is part of social plugins or such widget: socialbutton[.]site. Those buttons typically allow users to ‘Like” or retweet an article easily from the website they are visiting.

Overview


We spotted two different JavaScript files (analytics.js and widget.js) and for each there is a clean version and a malicious one. You are served the clean version if you browse directly to the JS without the proper referer (compromised upper site).

Social button redirect


Injected script and obfuscated code


Redirection to Angler (decoding JS, from unicode to text)



Read more: Fake Social Button Plugin Redirects to Angler EK
 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Yep, and if you notice they do away with the initial JS query because they have inserted their own (malicious) script.
Java and flash are such awesome playgrounds for malware authors, it's sad.
Thanks Jack :)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top