Back to Newsroom

13 November 2012

For at least the last few hours, Opera users have been exposed to e-threats coming from the notorious BlackHole exploit pack

 

For at least the last few hours, Opera users have been exposed to e-threats coming from the notorious BlackHole exploit pack.

Earlier today, the Bitdefender automated scan systems alerted us to the fact that a malicious obfuscated script loaded by hxxp://portal.opera.com address redirects users towards a malicious page hosting the notorious BlackHole exploit. Most likely, the script has been loaded through third-party advertisement, a practice commonly known as malvertising.

The hidden and obfuscated piece of code in the Opera Portal homepage inserts an IFrame that loads malicious content from an external source. If the Opera user hasn’t changed their default homepage, active malicious content is loaded from a third-party website (g[removed]750.com/in.cgi) whenever they open their browser.

This malicious page harbors the BlackHole exploit kit (we got served with the sample via a PDF file rigged with the CVE-2010-0188 exploit) that will infect the unlucky user with a freshly-compiled variant of ZBot, detected by Bitdefender as Trojan.Zbot.HXT. The ZBot malware is on a server in Russia which, most probably, has also fallen victim to a hacking attack, allowing unauthorized access via FTP.

Bitdefender detects the obfuscated script as Trojan.Script.478548; the offending page loaded by the Opera Portal was also blocked since the emergence of the attack via the cloud URL blocker.

If you have any doubts about whether you have fallen victim to this stunt, you should run a 60-second QuickScan available on the Bitdefender Quickscan website.

 

This article is based on the technical information provided courtesy of Cristina Vatamanu and Răzvan Benchea, Bitdefender Virus Analysts.

 

 Share

Contacts