At the time of writing, more than 200,000 Web pages have been compromised, amounting to close to 30,000 unique Web sites (hosts). The injection hijacks visitors to the compromised sites and redirects them to rogue AV sites that attempt to trick them into downloading and installing a Trojan onto their computer.
The injected code is very short and is placed at the bottom of the page:
After a three-level redirection chain, victims land on a fake AV site. In this example, the first chain is the ".rr.nu", and the landing site is the ".de.lv" top-level domain, but the landing site keeps changing.
The rogue AV site appears to perform a scan on the computer and scares the user by displaying fake malware detections of Trojans. The page looks like a Windows Explorer window.
The fake scanning process looks like a normal Windows application, however, it is only a pop-up window within the browser. The fake antivirus then prompts visitors to download and run their "antivirus tool" to remove the supposedly found Trojans. The executable is itself the Trojan.
More than 85% of the compromised sites are in the United States, while visitors to these web sites are more geographically dispersed. While the attack is specific to the US, everyone is at risk when visiting these compromised pages.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.