Malware attack when logging into Wiki
Good evening SysAdmins,
I don't know if this is a continuation of the above malware incident, or not, but just now, while logging into the Wiki (via the "Recent Changes" page), Norton prevented an attack and provided the following info in its alert:
- Severity: High
- Summary:An intrusion attempt by zzgjrlobch.hopto.org was blocked
- Date & Time: 4/12/13 8:12:56 PM (EDT)
- IPS Alert Name: Web Attack: FakeAV Download 2
- Attacking Computer: zzgjrlobch.hopto.org (212.124.115.117, 80)
- Attacker URL: zzgjrlobch.hopto.org/index.php?c=RaENOjEayDF925cOxP3ACC60zajgAjCTlcK0liAaKtvDheVQzm+YhzfWz1MP...
(Edit: this post renders the URL with a space where there is none before AaK...)
- Destination Address: (My machine name)(My internal IP, port 3799)
- Source Address: 212.124.115.117 (212.124.115.117)
- Traffic Description: TCP, http
- Note: Network traffic from zzgjrlobch.hopto.org/index.php?c=RaENOjEayDF925cOxP3ACC60zajgAjCTlcK0liAaKtvDheVQzm+YhzfWz1MP... matches the signature of a known attack. The attack was resulted from \DEVICE\HARDDISK\VOLUME2\WINDOWS\SYSTEM32\SVCHOST.EXE
I might be wrong, but I am guessing that this is related to a (possibly infected) Google ad that appears to be incompletely displayed in the ad-box at the bottom of the left navigation column, below the "ToolBox" section. Right now it has an icon for "Download" and another for "Play", but no other identifying information, no text, no logos, no additional description, etc.
I suspect the Google ad because I had already been on the "Recent Changes" page, and was attacked only as it refreshed after logging-in.
Edit: To be clear, I did not click on the Google ad. This happened as soon as I typed my credentials into the log-in screen and tapped my keyboard's "Enter" button, as the "Recent Changes" page was reloading after a successful login.
Edit #2: I just now noticed in small-print at the bottom of the suspect-ad the following text "Advertisement for FreeDailyDownload.com"
Edit #3: This is the URL that displays when the suspect-ad is "moused-over":
Code:
http://www.googleadservices.com/pagead/aclk?sa=L&ai=C2db5EKNoUb33IY3U0AHt7YHgAujrvdgCsPr7s0DAjbcBEAEg_Y-IA1CC9ayEBWDJ_puN7KSkEq
Thank you for your continued efforts to protect RR.
Hope this helps,