On 28 June, the popular video service Dailymotion was violated to redirect its users to the Sweet Orange Exploit Kit. This exploit kit exploits vulnerabilities of Java, Internet Explorer, and Flash Player. If the vulnerabilities of the above applications are successfully exploited, a pay-per-click malware goes down to the victim's computer. Since this week, Dailymotion is no longer infected, as security technicians have managed to eliminate the threat.
The attackers managed to break Dailymotion by injecting an iframe into its website. Let's recall that Dailymotion is at the top of Alexa's list and is on 100's most popular websites. So the attackers could potentially infect several malware computers with this attack. The attack hit mainly Dailymotion visitors from the US and Europe.
How did the attack work?
Attackers with the injected iframe on the Dailymotion website were able to redirect users to a different website. This site in turn sent users to a page containing the Sweet Orange Exploit Kit (Symantec has awakened it from 2013)
Exploit Kit can detect vulnerable plugins on the user's computer and use the exploits they need. Sweet Orange exploits the following known vulnerabilities:
- Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2013-2551)
- Adobe Flash Player Buffer Overflow Vulnerability (CVE-2014-0515)
- Oracle Java SE Remote Java Runtime Environment Vulnerability (CVE-2013-2460)
If Exploit Kit can successfully exploit any of these vulnerabilities, Trojan.Adclicke will download the victim's computer. This malicious software causes the infected computer to click on pay-per-click ads to generate revenue for the attackers.