Caphaw trojan being served up to visitors of AskMen.com, according to Websense
Multiple pages across AskMen.com have been compromised to serve up a nasty trojan known as Caphaw.
A highly popular website that attracts more than 10 million visitors each month – AskMen.com – is now redirecting users to a nasty piece of malware known as Caphaw, according to researchers with Websense Security Labs.
The host master of AskMen.com has been notified by Websense, but the security firm has not received a response or acknowledgment, according to a Monday post by Abel Toro, a Websense security researcher.
In a Tuesday email correspondence, Alex Watson, director of security research with Websense, told SCMagazine.com that visitors are being redirected to the Caphaw trojan via code that was injected on multiple pages across AskMen.com.
“After visiting certain pages on Askmen.com, users were redirected to generated domains, where they would be exploited by a PDF or Java-based exploit – most likely via [the] Nuclear Pack exploit kit – and the Caphaw malware would be downloaded,” Watson said.
A variant of the Shylock banking trojan, Caphaw can be used to take control of infected systems, access files and folder via internal FTP server, redirect internet traffic via proxy server, send ICMP packets used in distributed denial-of-service attacks, and update itself.
“The Caphaw banking malware that was delivered by the exploit kit only affects Windows-based systems,” Watson said. “We have not seen any examples of users running iOS, Android, or Apple OS X being served different malware.”
The fact that no other publications from Ziff Davis – the company that acquired AskMen.com in 2013 – are being affected indicates that a local vulnerability, such as cross-site scripting (XSS), was most likely the vector used by attackers, Watson said.
AskMen.com did not respond to SCMagazine.com requests for comment.
UPDATE: "We've done a thorough investigation and there is no evidence of any malware," an AskMen.com spokesperson told SCMagazine.com in a Tuesday email correspondence. "We take security issues very seriously and we have multiple measures in place to protect our users. We're also in contact with the vendor who purported to see evidence of an attack."