SMCI widget and by Network Solutions still serving malware, part 1/3

by Wayne Huang, NightCola Lin, Chris Hsiao of Armorize.
(Please see follow-up post: More than 500,000 Network Solutions parked domains actively serving malware)
Screenshot 1

The beginning of this year saw mass Web hosting compromises across numerous hosting providers; thousands of websites were compromised via vulnerabilities in shared hosting providers and as a result, were serving malware. We thought eventually everything would be cleaned up and everyone's operations would be back to normal--but it seems that didn't happen... yet.

Recently a lot of our HackAlert customers are still flagged (by HackAlert) to be serving malware. We noticed a particular group of them today--those that have installed the "Small Business Success Index" widget by Network Solutions. There are two ways one can install the widget into one's website or blog--via the one-click installation script offered by Widgetbox (as seen in Screenshot 1 above), or by directly visiting Network Solution's (Screenshot 2 below).
Screenshot 2

We quickly registered a Google Blogger account and verified that whoever installed this widget, will be serving malware as of now. Although Widgetbox is only one website providing an installation script for this widget, this site alone has recorded 5,371 installations (yes that "1" is us) already (see Screenshot 1 above). This means more than five thousand sites may be affected.

Here are the steps we went through in our verification process. We first went to Widgetbox and clicked on the "Install Widget" button as seen in Screenshot 1. A popup showed us the javascript to embed, as well as one-click-install buttons for Facebook, Blogger, Twitter, iGoogle, WordPress, LinkedIn, my Yearbook, etc. Yikes:
Screenshot 3

We clicked on "Blogger" and it worked--our armorizetest blog now has the widget installed:
Screenshot 4

Clicking on "Edit" shows the widget's javascript code--it's loading the javascript from
Screenshot 5

Visiting our test blog now shows the widget:
Screenshot 6

And now, our blog is officially serving malware. Scanning this test blog with HackAlert shows that our blog is indeed serving malware now. Here's the traceback:

1. in,
<script type="text/javascript" src=""></script><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('68804a4e-6a5a-444c-b0d7-efdced64bee1');</script>

if(!window.WIDGETBOX){(function(){var D=false;var C=function(){WIDGETBOX.setPageLoaded();};var B=function(){WIDGETBOX.setPageUnloaded();};WIDGETBOX={libs:{},version:"39866",urls:{runtimeBaseUrl:"",...,markupRuntimeBaseUrl:"",...},

3., code omitted

<iframe style="" height="300px" frameborder="0" style="border:none;overflow:none;" width="180px" src=""></iframe>

<iframe frameborder=0 src="" width=1 height=1 scrolling=no></iframe>

6., malicious code
7., malicious code
8., malicious code
9., malicious code
10., malicious code

Conclusion: what a quick way to make your blog, website, facebook, linkedin, all serving malware.

Googling a bit, we verified that the domain was definitely compromised and injected with a r57shell (webshell), which allowed the attacker easy manipulation of the site. Check this link.

In part 2, we'll detail the actual malware behavior.

Note: We received some questions so we'll answer here. If you are trying to analyze this malware, note that it's quite mean and implements the following behavior:
1. Serves to each IP only once
2. Blocks well-known drive-by download analysis services such as Wepawet and jsunpack. These won't be able to help you in this case--see Wepawet results and jsunpack results.
Read more (rest of article)...