Google - new malware hosting
A new type of malware has been found today which uses the Google search engine database for hosting. Werner Klier (virus researcher from GData) pointed us to one very puzzling result of Google search. This result was detected as malware with avast! from the beginning. It is however a very interesting approach from malware creators - using Google to host their malware. Here I'll describe how this infection works (virus researchers from GData, Ralf Benzmüller and Armin Büscher, reached the same conclusion).
Next picture represents the result from Google as shown in the web browser. Details have been removed from the image - only the small part of the text is readable to show the beginning of the malicious link.
The whole link is shown in the next image. The most important part of this link is just after string “?ID=”. It is SQL command which is executed on the targeted PHP file. The only one condition for execute SQL command is the bug in the target document to allow so called 'SQL injection'. The rest of the SQL command contains encoded html code which is then injected into the generated document. PHP code doesn’t contain any malicious script – malicious code is injected from Google’s link by clicking on it. This is the yet unseen approach I was talking in the beginning of this article.
Next picture shows html code just after the injection – nothing is stored on the server, and the server version of the document is still clean. Injected code contains some keywords and a link to malware distribution server - everything needed for redirecting and infecting the target computer.
Last decoded string from the previous image is the html command which loads redirection script from malware distribution server. If it is loaded by the browser then infection begins!
Highly effective Cerber ransomware is spread via phishing emails and demands more than $700 in ransom
Based on analysis of past Locky ransomware attacks, experts in the Avast Threat Labs predict that another attack is imminent.