• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Bad Sites   »   Cory Aquino’s Death Used to Spread Another FAKEAV

Cory Aquino’s Death Used to Spread Another FAKEAV

  • Posted on:August 3, 2009 at 5:43 am
  • Posted in:Bad Sites, Malware
  • Author:
    Det Caraig (Technical Communications)
7

coryblogIt has only been a few days since former Philippine president Corazon Aquino died of cardio-respiratory arrest last Saturday (August 1). Cybercriminals are already well on their way to use this event for their own selfish gains.

Cybercriminals use popular and high interest events to further their cause—in this case, spreading fake antivirus software detected by Trend Micro as TROJ_FAKEALRT.FK.

Trend Micro threat analyst Joseph Pacamarra found that searching for details on the former president’s death with the words “corazon aquino’s death” led users to the following malicious sites:

  • http://{BLOCKED}-gonzales.redxhost.com/corazon-aquino-death.html
  • http://{BLOCKED}sa.20x.cc/corazon-aquino-death.html
  • http://{BLOCKED}rank.0adz/corazon-aquino-death.html
  • http://{BLOCKED}-1.0adz.com/corazon-aquino-died.html

The cybercriminals used the same .php page (1.php) to redirect users who click the links above. However, this page was hosted on different domains, possibly to avoid detection. The redirections from the above links eventually led to the download of a fake antivirus from the following sites:

  • http://{BLOCKED}-pro-antivirus-scan.com/download.php?id=2022
  • http://{BLOCKED}-pro-antivirus-scan.com/download/Install-6a1e7ce_2022.exe
  • http://{BLOCKED}-pro-antivirus-scan.com/download/Install-74f10_2022.exe
  • http://{BLOCKED}-pro-antivirus-scan.com/download/Install-6a75f_2022.exe
Click Click

This is not the first time that news was used to launch blackhat SEO attacks:

  • Blackhat SEO Quick to Abuse Farrah Fawcett Death
  • Scammers Ride on H1N1 Global Pandemic
  • “Solar Eclipse 2009 in America Leads to FAKEAV

Users are advised to rely on legitimate and reputable news sites to avoid being infected. Trend Micro product users are advised to update to the latest CPR version 6.338.03 to stay protected.


Updated on 05 August 2009 10:57 PM (UTC-7)

After further analysis, the file corazon-aquino-died.html1, which may be downloaded from the sites mentioned earlier, is now detected as HTML_REDIR.ECT. This is consequently blocked by Trend Micro’s Smart Protection Network.


Updated on 14 August 2009 12:45 AM (UTC-7)

After a recent reanalysis of TROJ_FAKEALRT.FK, Trend Micro threat analyst Kathleen Notario discovered that the sample (“Personal Antivirus”) does not exhibit FAKEAV behaviors. It does not, for instance, display a FAKEAV graphical user interface (GUI) nor causes system modifications. It has been found to be missing a main installer component.

However, the Trojan may access the following domains to download possibly malicious files or install other FAKEAVs:

  • http://{BLOCKED}ne-sachs.com
  • http://{BLOCKED}erbaseupdatesv2.com
  • http://{BLOCKED}twareupdatev2.com
  • http://{BLOCKED}ben.cn
  • http://{BLOCKED}-updatesv5.com
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.