The red4.html code contains
Code:
<META HTTP-EQUIV="Refresh" CONTENT="0; URL=http://eftpsid0362283.ru/contacts/s3">
The refresh loads a Russian phishing site such as eftpsid0362283.ru
A look-up shows that this was registered in Russia on October 14
domain: EFTPSID0362283.RU
nserver: ns1.freedns.ws.
nserver: ns2.freedns.ws.
state: REGISTERED, DELEGATED, UNVERIFIED
person: Private Person
phone: +7 495 7139598
e-mail:
[email protected]registrar: REGRU-REG-RIPN
created: 2010.10.14
paid-till: 2011.10.14
source: TCI
Another earlier redirection went to eftpsid0363536.com which was registered at Moniker on October 7
Domain Name: EFTPSID0363536.COM
Registrar: MONIKER ONLINE SERVICES, INC.
Whois Server: whois.moniker.com
Referral URL:
http://www.moniker.com/whois.htmlName Server: NS1.DOMAINSERVICE.COM
Name Server: NS2.DOMAINSERVICE.COM
Name Server: NS3.DOMAINSERVICE.COM
Name Server: NS4.DOMAINSERVICE.COM
Status: redemptionPeriod
Updated Date: 13-oct-2010
Creation Date: 07-oct-2010
A directory listing of a typical infected machine shows that a number of additional folders were created from October 10. Most folders contain phishing links, others contain links to a pharmacy fraud. The added folders are 6 or 7 characters long and contain the html files that perform the redirections.The compromise of these servers is most likely achieved because of a simple password on the administrator or FTP accounts. The administrator of these compromised machines should
1. detect and erase the additional folders and their contents
2. change access passwords to a more robust format containing mixed case, numeric and special characters