Caphaw trojan being served up to visitors of AskMen.com, according to Websense

Share this article:
Study indicates that SQL injection continues to be a pervasive threat
Multiple pages across AskMen.com have been compromised to serve up a nasty trojan known as Caphaw.

A highly popular website that attracts more than 10 million visitors each month – AskMen.com – is now redirecting users to a nasty piece of malware known as Caphaw, according to researchers with Websense Security Labs.

The host master of AskMen.com has been notified by Websense, but the security firm has not received a response or acknowledgment, according to a Monday post by Abel Toro, a Websense security researcher.

In a Tuesday email correspondence, Alex Watson, director of security research with Websense, told SCMagazine.com that visitors are being redirected to the Caphaw trojan via code that was injected on multiple pages across AskMen.com.

It is a sneaky attack; the injected code loads automatically upon browsing to the main page, and silently redirects visitors to websites serving the exploit code, according to Toro, who added that the injected code is obfuscated and at the bottom of legitimate AskMen.com JavaScript pages.

“After visiting certain pages on Askmen.com, users were redirected to generated domains, where they would be exploited by a PDF or Java-based exploit – most likely via [the] Nuclear Pack exploit kit – and the Caphaw malware would be downloaded,” Watson said.

A variant of the Shylock banking trojan, Caphaw can be used to take control of infected systems, access files and folder via internal FTP server, redirect internet traffic via proxy server, send ICMP packets used in distributed denial-of-service attacks, and update itself.

“The Caphaw banking malware that was delivered by the exploit kit only affects Windows-based systems,” Watson said. “We have not seen any examples of users running iOS, Android, or Apple OS X being served different malware.”

The fact that no other publications from Ziff Davis – the company that acquired AskMen.com in 2013 – are being affected indicates that a local vulnerability, such as cross-site scripting (XSS), was most likely the vector used by attackers, Watson said.

AskMen.com did not respond to SCMagazine.com requests for comment.

UPDATE: "We've done a thorough investigation and there is no evidence of any malware," an AskMen.com spokesperson told SCMagazine.com in a Tuesday email correspondence. "We take security issues very seriously and we have multiple measures in place to protect our users. We're also in contact with the vendor who purported to see evidence of an attack."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Android bug allowing SOP bypass a 'privacy disaster,' researcher warns

Android bug allowing SOP bypass a 'privacy disaster,' ...

Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.

Congressman asks Issa for hearing on CHS breach

The top Democrat on the House Oversight and Government Reform Committee asked for a hearing to investigate the CHS breach.

Google reveals 150 percent jump in gov't requests for user data

Google indicated in its most recent transparency report that it also saw a 15 percent jump in government requests for user data since the end of last year.