Fake Amazon email leads to exploit kit
Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit.
The email looks pretty legitimate (click on the screenshot to enlarge it):
The only thing that gives it away at first glance is the fact that multiple email addresses are included in the “To:” field, and the email is personalized for the first recipient.
“All links in the email body, apart from the linked email address, lead users to the same HTML page that are hosted on various legitimate but compromised WordPress domains,” GFI’s Jovi Umawing warns, and adds that the links are most likely to be changed from time to time.
Still, all those links take the user to a page where they supposedly have to wait for the information about the “ordered” book to load. In the meantime, some JavaScript code loads an iframe that redirects users to another page, where the exploit kit is hosted.
Blackhole then checks for the presence of Adobe Reader and Adobe Flash on the user’s system, and finally deploys two exploits that target a Adobe Flash Player, Adobe Reader and Acrobat vulnerability and a Microsoft Windows Help and Support Center vulnerability to take control of the user’s system and download malware on it.
As always, users are reminded to keep their software updated, as the exploits used by various exploit kits do not work on the latest versions.