woensdag 18 juni 2014

Guerilla marketing on twitpic targetting Android devices

In this blogpost we will describe a new method observed by us that tries to trick android users into buying subscriptions. The guerilla marketing tactics caught our attention as of this week several people complained about twitpic serving malware. We decided to investigate this issue a little bit further and eventually were able to reproduce the supposed 'malware' and capture its behavior.

First things first, although several people reported the download of malware in the form of an apk file, we were not able to reproduce that situation. We were able though, to reproduce a very nifty full page forward from the website to a landing page were several tactics were used to trick the user into clicking on specific links and eventually acknowledging the purchase of a subscription worth €5 a week.

The story starts by visiting the website Twitpic is a well known and frequently used platform to share pictures on twitter. Once a twitpic link is opened, the screen below appears after 3 seconds, making the average Android user think the application WhatsApp is interfering and an update for the program is available.

What is actually happening?
While visiting the website loads a lot of ads. One of these ads is from AppNexus. This add makes a connection (in our case) to Which in this case, loads a page from This supposed banner contains the following html code:

The banner loads an iFrame. This iFrame again is loaded from
This specific mcenter.php?aid=98&ext=6 checks the user agent of the visiting client and screen width used. If the User-Agent does not match that of an Android device or the screen width does not match that of an Android device it will skip the JavaScript part that is displayed below and will only load the HTML content. In our case, where we use an Android device it will load the HTML+JavaScript code displayed below:

The webpage[string] serves a HTTP/1.1 302 Moved Temporarily and contains the following value:[TmobileNetherlandsbv]_3_a90_v22_2014-06-15
In the JavaScript code several functions are initiated. A setTimeOut function is called waiting 3000 milliseconds to execute a function that creates a click event on the HTML a-element which will initiate the provided href URL to load. In this case a HTTP/1.1 302 Moved Temporarily page was thrown containing a new URL. The browser of your Android device will forward to that page, taking over the previous Twitpic page. Once forwarded the image below will appear.

As shown in the pop-up above, WhatsApp needs an update. The domain used seems to be, very trustworthy. The "OK" button can be pressed. And a countdown will start, as shown below:
If you look closely to the domain you will see that the domain used is not "" but instead "". is an educational website, it is not clear weather this domain is hijacked, hacked or willingly cooperating. Obviously the original domain is not involved in anyway, the crooks are just trying to let us think this domain is involved and thus make it look trustworthy.

Once you click the "Download now" button the webpage below is shown.

Here in small letters your subscription is described, in top the subscription costs of 5 euro are displayed. Below it says you are a member automatically. Users that don't read carefully will just press the download button to, what they believe, install the WhatsApp update.
Once you press the "Download" button, the following page is displayed:

Your mobile number is filled in automatically and you just have to press the "Continue" button. Once the "Continue" button is pressed an SMS-text message is sent to the mobile phone containing a verification link in it. Once that link is clicked the subscription is acknowledged and you will be charged 5 euros per week.

5 opmerkingen:

  1. I have been using Kaspersky Anti virus for a few years, I recommend this Anti-virus to all you.

  2. Excellent Blog! I would like to thank for the efforts you have made in writing this post. Thanks for sharing. for More visit:- WhatsApp Dare Games & WhatsApp Group Names.

  3. Hi Everyone!

    We have USA fresh & Verified SSN Leads with best connectivity score
    All info checked & genuine

    Info in LEADS
    First Name | Last Name | SSN | Dob | DL Number |Address | State | City | Zip | Phone Number | Account Number | Bank NAME

    *Price for SSN lead $2
    *You can ask for sample before any deal
    *If anyone buy in bulk, we can negotiate
    *Sampling is just for serious buyers

    ->$5 PER EACH

    ->Hope for the long term deal
    ->Interested buyers contact me fast

    Whatsapp > +923172721122
    Email >
    Telegram > @leadsupplier
    ICQ > 752822040


    Telegram > @leadsupplier
    ICQ > 752822040
    Email >

    >>1$ each without DL/ID number
    >>2$ each with DL
    >>5$ each for premium (also included relative info)

    *Will reduce price if buying in bulk
    *Hope for a long term business



    >Fresh Leads for tax returns & w-2 form filling
    >Payment mode BTC, ETH, LTC, PayPal, USDT & PERFECT MONEY


    >SSN+DOB Fullz
    >CC with CVV
    >Photo ID's
    >Dead Fullz
    >Carding Tutorials
    >Hacking Tutorials
    >SMTP Linux Root
    >DUMPS with pins track 1 and 2
    >Sock Tools
    >Server I.P's
    >HQ Emails with passwords

    Email >
    Telegram > @leadsupplier
    ICQ > 752822040