Earlier this week, further evidence that malicious eCard spammers have expanded their operations beyond Australia and Yahoo! Greetings was discovered, with confirmed targets in North America, Europe and Asia using a variety of eCard supplier accounts.
The Australian eCard scammers placed a malicious hyperlink in the email, which first sends the user's web browser to an exploit server. The exploit server checks to see if the user's web browser has been patched for the latest software vulnerabilities, and if it's unpatched, the server silently force-downloads a rootkit and a keylogger onto the user's computer before redirecting the web browser to an authentic Yahoo! Greetings card.
The actual exploit, known as MDAC, has been gaining in popularity among cyber criminals. The MDAC exploit code is launched by a WebAttacker script, which was developed by Russian cyber criminals. According to Exploit Prevention Labs WebAttacker is the most prevalent Internet-borne exploit generator; it was also behind the new VML exploit.
Systems that are up to date on patching should not be vulnerable to the original version of this eCard exploit, but the latest version of the eCard scam is significantly different, and is indicative of an escalation of the threat.