

Rewterz Threat Advisory – CVE-2019-15295 – BitDefender Antivirus Free 2020 – Privilege Escalation to SYSTEM
August 22, 2019
Rewterz Threat Advisory – CVE-2019-1938 – Cisco UCS Director and Cisco UCS Director Express for Big Data API Authentication Bypass Vulnerability
August 23, 2019
Rewterz Threat Advisory – CVE-2019-15295 – BitDefender Antivirus Free 2020 – Privilege Escalation to SYSTEM
August 22, 2019
Rewterz Threat Advisory – CVE-2019-1938 – Cisco UCS Director and Cisco UCS Director Express for Big Data API Authentication Bypass Vulnerability
August 23, 2019Severity
Medium
Analysis Summary
A poker program associated with loading a Magecart skimmer. This activity was discovered when a customer reported that they saw endpoint protection blocking network connections being made by their poker software. Further investigation led the researchers to discover that the malicious traffic occurring was an HTTP GET request to retrieve a JavaScript file. The JavaScript file contained the characteristics of a credit card skimmer and had the poker software’s website hardcoded into the script, indicating that it was custom designed to target that company. They discovered that the reason the poker software itself was loading this script was due to embedded browser pages within the application, not that the software was Trojanized. Visiting the website in a browser would lead to the skimmer being loaded also. The site was likely compromised by an exploit related to the vulnerable version of Drupal it was running. Enumerating other JavaScript files hosted on the remote domain used for the poker software skimmer, the researchers found several other skimmers designed to target specific companies’ websites.
Impact
Exposure of sensitive information
Indicators of Compromise
IP(s) / Hostname(s)
172[.]93[.]103[.]194
URLs
- http[:]//ajaxclick[.]com/ajax/libs/1[.]0[.]2/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]1[.]2/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]1[.]3/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]2[.]1/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]3[.]2/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]3[.]4/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]3[.]6/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]3[.]9/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]4[.]0/click[.]js
- http[:]//ajaxclick[.]com/ajax/libs/1[.]4[.]1/click[.]js
Remediation
- Block threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the link/attachments sent by unknown senders.