Jump to content

Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish


Recommended Posts



Crossposted in SECURITY ALERTS

Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish

Published: 2012-09-01,

Last Updated: 2012-09-01 01:22:41 UTC

by Russ McRee (Version: 1)

Thanks to Susan Bradley for reporting this to ISC.

We're receiving multiple reports of a phishing campaign using the template from a legitimate Microsoft email regarding Important Changes to Microsoft Services Agreement and Communication Preferences.

The legitimate version of this email is specific to a services agreement seen here, per a change to Microsoft services as of 27 AUG.

The evil version of this email will subject victim to a hyperlink that will send them to a Blackhole-compromised website, which will in turn deliver a fresh Zeus variant.

I'll walk you though the full sample set I analyzed. Susan sent us an email including the following header snippet:

Received: from [] ([]) by

inbound94.exchangedefender.com (8.13.8/8.13.1) with ESMTP id q7VFDPjO029166

A legitimate header snippet:

Received: from smtpi.msn.com ([]) by COL0-MC3-F43.Col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900) is in China, is Microsoft.

The legitimate email will include a hyperlink for
, which points to the above mentioned services agreement.

Obfuscated to protect the innocent:
The phishing mail will instead include a hyperlink to the likes of allseasons
.us, radiothat
.com, and likely a plethora of others. I assessed radiothat
.com and was redirected to 209.
.14 which is running the very latest Blackhole evil as described on 28 AUG by Websense in this

Source code review of the web page served included <applet/code="ndshesa.ndshesf"/archive="Leh.jar"><param/nam=123 name=uid value="N013:011:011:04:037:061:061:047:034:076:074:0102:076:074:047:047:047:074:067:053:061:04:074:04:013:04:075:054:


The VirusTotal link for Leh.jar is
, and the VirusTotal link for the Zeus variant offered is


  • Hover over hyperlinks and ensure they are directing you to legitimate sites before clicking. Be cautious even thereafter.
  • Contemplate disabling Java until the next update is released.
  • Review email headers if in doubt for messages you receive that seem suspicious.
  • Keep your antimalware signatures up to date. While limited at the moment, detection for both the Java exploit and the Zeus variant is increasing.

Ping us with questions or comments, as well as anything you'd like to share regarding similarly received emails from this phishing campaign.

Russ McRee | @holisticinfosec


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.