A week ago (on Monday, January 20), as well as on January 14, 11, and 10, Hasbro’s website pushed malicious software to visitors’ computers. As with the Cracked.com compromise a week prior, the incident was the result of direct site compromise, and affected users were unlikely to have recognized that their computers were infected. For reference, below is a screenshot of Barracuda Labs’ malicious URL detection environment after a successful attack.
No smiles during this visit to Hasbro’s website.
The chain of redirects that began at Hasbro’s front page and ended with the installation of malicious software on visitors’ computers were as follows.
-> hxxp://www[.]hasbro[.]com/<redacted> (xMultiple)
—> hxxps://stats[.]jusybes[.]pw/<redacted> (xMultiple)
—-> hxxp://ahnc[.]blockscheine[.]com/redacted (xMultiple)
The second request to stats[.]jusybes[.]pw is notable as HTTPS is used to obfuscate the resulting redirection to ahnc[.]blockscheine[.]com, which serves several Java exploits. Upon successful exploitation, a payload is installed that is not well detected (both Symantec and Trend flag the malicious executable as benign).
Given the frequency with which Hasbro's website has recently served drive-by downloads, Barracuda Labs recommends that users refrain from visiting the site until its operators have confirmed it is again safe.
An archive containing packet capture (PCAP) files that show the sequence of events for drive-by downloads originating from Hasbro.com for January 20, 14, 11, and 10 can be downloaded
Christine Barry is Senior Chief Blogger and Social Media Manager at Barracuda. In this role, she helps bring Barracuda stories to life and facilitate communication between the public and Barracuda internal teams. Prior to joining Barracuda, Christine was a field engineer and project manager for K12 and SMB clients for over 15 years. She holds several technology credentials, a Bachelor of Arts, and a Master of Business Administration. She is a graduate of the University of Michigan.