Over the last several days, RiskIQ has observed numerous incidents involving visits to sites running on the Drupal content management system. Several installations of Drupal 7 have been observed serving an injected script tag that directs site users to sites hosting the RIG exploit kit.
Observed instances of RIG incidents tied to campaign
The same RIG infrastructure (identified by second level DNS domains) is also receiving traffic from sites running WordPress, with similar compromise patterns.
On October 15, the Drupal project published advisory SA-CORE-2014-005 (and accompanying FAQ) containing information about a SQL injection vulnerability in the database abstraction API layer, which was itself vulnerable to unauthenticated SQL injection by unauthenticated remote users. SQL injection flaws can pave the way for privilege escalation, arbitrary code execution, account takeover and, in some cases, complete compromise of an application or server. SQL injection is a common technique used to insert malicious script tags into website content to drive traffic to blackhat infrastructure.
On October 29, the Drupal project published a public service announcement notifying users of confirmed reports of mass SQL injection attacks leveraging the disclosed vulnerability. Drupal rates the impact of the vulnerability as 25/25; it further states:
Automated attacks began compromising Drupal 7 websites that were not patched or updated to Drupal 7.32 within hours of the announcement of SA-CORE-2014-005 – Drupal core – SQL injection. You should proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC, that is 7 hours after the announcement.
Examples
The following Drupal-based websites were observed driving traffic to the exploit kit infrastructure. Incident links are provided to view additional information about observed activity. The method of redirection for the drive-by download is simple compared to many other active malware distribution campaigns; the iframe is injected into the site content directly, rendering at CMS page load time. The iframe points directly to the exploit kit landing page; no intermediary redirection/rotation (TDS) services are utilized to add misdirection, etc.
Popular Science (www.popsci.com) Incident link
Upon hitting a page returning a 404, the iframe is returned by the 404 handler.
Iframe redirecting Popular Science online visitors to RIG exploit kit
Homestead Technologies (www.homestead.com)
Web hosting firm Homestead also impacted:
iframe redirecting Homestead visitors to RIG exploit kit
Typepad (www.typepad.com) Incident link
iframe redirecting Typepad visitors to RIG exploit kit
Spin Magazine (www.spin.com) Incident link
iframe redirecting SPIN visitors to RIG exploit kit
Advertise.com (www.advertise.com) Incident link
iframe redirecting Advertise.com visitors to RIG exploit kit
Threat Indicators
Affected Drupal installations may be impacted by multiple attackers and leveraged for a variety of purposes. The activity RiskIQ has observed is driving traffic from affected sites to installations of RIG exploit kit, which serves a variety of browser and plugin exploits to visitors in an attempt to install malware on their systems. The RIG installations we’ve observed have been hosted on a number of rogue A records in compromised DNS zones pointing to the following host:
46.182.30.198 AS49505 | RU | ripencc | 2009-06-18 | SELECTEL OOO _Network of data-centers _Selectel_
AS49505 Selectel is a large Russian datacenter operator, and a common source of Eastern European cybercrime activity. Domain names found resolving to this IP address include:
adv.corrosionspeicalist.com
call.corrosionspeicalist.com
int.corrosionspeicalist.com
able.corrosionstandards.com
black.corrosionstandards.com
born.corrosionstandards.com
dream.corrosionstandards.com
art.gm9540.com
cross.gm9540.com
fellow.gm9540.com
twit.gm9540.com
above.gmw14872.com
add.saltfogtestlab.com
baron.corrosionstandards.info
bass.corrosionstandards.info
job.corrosionstandards.info
velvet.corrosionstandards.info
chekc.corrosioncenter.net
fly.corrosioncenter.net
plane.corrosioncenter.net
secureserver.corrosioncenter.net
sub.corrosioncenter.net
year.corrosioncenter.net
expert.corrosionexperts.net
focus.corrosionexperts.net
map.corrosionexperts.net
nod.corrosionexperts.net
story.corrosionexperts.net
corp.corrosionspecialist.net
inc.corrosionspecialist.net
int.corrosionspecialist.net
product.corrosionspecialist.net
snake.corrosionspecialist.net
tone.corrosionspecialist.net
video.corrosionspecialist.net
crown.corrosionstandards.net
dodge.corrosionstandards.net
hit.corrosionstandards.net
island.corrosionstandards.net
jaunt.corrosionstandards.net
look.corrosionstandards.net
relay.corrosionstandards.org
We offer the following advice regarding the observed activity:
At RiskIQ, we track many different Magecart groups. We continually observe evolutions in the techniques they employ to skim card…
At the request of our customers, March 9th, RiskIQ's team of trained intelligence analysts began compiling disparate data and intelligence…
At the request of our customers, March 9th, RiskIQ's team of trained intelligence analysts began compiling disparate data and intelligence…
For the past ten years, RiskIQ has been crawling and passive-sensing the internet to help security teams prepare for a…
The COVID-19 pandemic is making life unrecognizable for most of us and has presented a host of new, unique challenges…
On Thursday, February 20th, around 3 pm GMT, criminals RiskIQ identifies as Magecart Group 8 placed a JavaScript skimmer on…