A Piriform web service used by Speccy has been compromised to display a malicious javascript. This was discovered when one of the BC Advisors, keyboardNinja, was using Speccy to look at his network information. When the information was displayed he noticed that the IP address information was preceded by some HTML that would load a javascript from nsa-lab.com, which has no affiliation with the United States National Security Agency. Upon visiting this url, his antivirus detected it as a malicious javascript.
After hearing about it, I downloaded the software and took a look at the network section. I too was being shown the javascript before my IP address. When looking at the network traffic I saw that this was being caused by a compromised script on the Piriform website. This script, hxxp://speccy.piriform.com/ip/, was created to output a visitors public IP address. Somehow it was compromised to also display HTML, that when viewed in a browser, would load a malicious exploit kit from nsa-lab.com. You can see a screen shot of this HTML code in the Speccy interface below:For most users this compromise won't affect them as Speccy does not render the HTML that would load the malicious script. Those, though, who save their report as an XML file could run into trouble. That is because by default XML files are automatically loaded into the default browser of Windows. Once this report is loaded in the browser, it will see the javascript HTML and execute it. This would cause the javascript from nsa-lab.com to launch in the browser and start an exploit kit that attempts to install malware on the computer via exploits that include Sun Java, Adobe Reader, and Adobe Flash vulnerabilities. When the exploit successfully runs, it will install malware onto your computer that has been detected by VirusTotal as:
BitDefender 7.2 2011.04.12 Gen:Variant.Kazy.3281
Commtouch 5.2.11.5 2011.04.06 W32/Hiloti.J.gen!Eldorado
Comodo 8307 2011.04.11 TrojWare.Win32.Trojan.XPack.~gen1
Emsisoft 5.1.0.5 2011.04.11 Gen.Variant.Kazy!IK
F-Prot 4.6.2.117 2011.04.12 W32/Hiloti.J.gen!Eldorado
F-Secure 9.0.16440.0 2011.04.12 Gen:Variant.Kazy.3281
GData 22 2011.04.12 Gen:Variant.Kazy.3281
Ikarus T3.1.1.103.0 2011.04.11 Gen.Variant.Kazy
K7AntiVirus 9.96.4360 2011.04.11 Riskware
Sophos 4.64.0 2011.04.11 Mal/Hiloti-D
I have tried to contact Piriform using the Contact page at their site, but when I submitted the message, I received a 404 error message, as shown below, meaning that the page it was requesting on their site did not exist and thus my message was not sent. Some of the BC staff members though are active on their forums and have passed on the message.
I have also contacted the owners of nsa-lab.com and alerted them to the malicious javascript being hosted on their site.
Hopefully this issue will be resolved quickly as Speccy is an excellent program. For those who are using Speccy, though, please do not save the report as XML and open it in a web browser until this issue has been resolved or you will become infected.