Britney Spear-Phishing: Malware, Instagram and Russia
1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
Loading...

Britney Spear-Phishing: Malware, Instagram and Russia

A group of Russian hackers has used Britney Spears’ Instagram account to come up with an ingenious malware scheme.

The comments section of Britney Spears’ Instagram account was used by a Russian hacking operation in an ingenious malware scheme.

Now, a few things to get out of the way right off the bat. First of all, this isn’t actually a phishing attack, it’s a malware scheme. But the pun was just too good to pass up. So, just this once let’s sacrifice accuracy in the name of a good joke (or a bad joke, depending on your sensibilities).

And don’t worry, I won’t lace this article with bad puns playing on popular Britney Spears song titles. That would be Crazy. Ok, sorry, I’ll just do it that once. Any more would be Toxic. Oops… I did it again. Damnit! That last one wasn’t on purpose. I swearI hope you won’t Hold it Against Me.

Ok, I’m really done this time.

Anyway, here’s how this crazy Britney Spears Instagram malware scheme works:

Turla, a hacking group thought to be associated with Russian intelligence, was found to be distributing malware and using Instagram as part of their attack. In order to hide the location of their server, which was being used to control infected machines, they posted an encoded message to Britney Spears’ Instagram account that appeared to be nothing more than the feelings of an enthusiastic fan.

There is a long path before we get to Britney. First, Turla needs to compromise a website. In this incident, it was an unnamed Swiss security company. With that done, Turla can now modify the code on that site. The second thing they do is begin distributing a malicious Firefox extension through the compromised site. The advantage of compromising an existing site with a user base is that they can leverage that trust to convince visitors it’s okay to install the extension.

Once that malicious extension is installed, Turla has successfully compromised the machine. This is where Britney Spears’ Instagram comes into play.

When hackers have infected a computer, depending on their goals, they may want to retrieve data from, and send commands to that computer. This is done with a command and control (C&C) server – set up specifically by the hackers to manage the devices they have infected.

It is vital that the C&C server remain hidden and operational. Hackers and researchers are in a constant cat-and-mouse game to take down C&C servers and get new ones online in order to keep control of compromised computers.

To hide the location of their C&C server, Turla used a specially-formatted message which encoded the URL of the server. It would be much simpler to just include the C&C URL directly in the code, but that would also make it easier for researchers to discover.

The message was posted on a picture on Britney Spears’ Instagram account and appeared like a fan comment. The comment is highlighted in red below:

britney spears instagram malware

The Firefox extension would use a “regex,” or regular expression, to turn that comment into a URL. A regular expression is a common programming function which can transform data. In this case, Turla wrote a regex which turned the comment into a Bit.ly URL (a link shortening service).

The Firefox extension would then visit the Bit.ly URL and be redirected to the C&C server. Once contact with the C&C server was established it could send and receive data and commands with the compromised computer. If the hackers suspected their C&C server was discovered, they could send out a new URL to communicate with.

The whole goal here is to obfuscate – make it difficult for a researcher to determine how the extension works and what C&C server it is communicating with. The hackers may have found a link on Instagram to be beneficial. For instance, they may know it’s a website likely to be accessible from most networks around the world.

It’s important to understand that Britney’s account was in no way “hacked” or compromised. The hackers are just using her post as a covert message board, hidden in plain sight. They could just have easily as chosen Selena Gomez, Usher, or your neighbor Fred.

ESET, the security company that first reported on this incident, noted that other malware have used similar tactics. In 2014, they found malware hiding encoded messages on a Twitter account. This is the first time ESET has seen Instagram being used to hide messages.

Why they chose Britney Spears’ account is anyone’s guess. Maybe they determined Spear’s account was less likely to moderate comments or delete posts. Maybe the early 2000s were just this hacker’s favorite era of pop. Or maybe they’re just a Criminal. Sorry, sorry. I said I’d stop.

I’m going to just cut myself off now.

Be the first to comment

Leave a Reply

Your email address will not be published. We will only use your email address to respond to your comment and/or notify you of responses. Required fields are marked *

Captcha *

Author

Patrick Nohe

Patrick started his career as a beat reporter and columnist for the Miami Herald before moving into the cybersecurity industry a few years ago. Patrick covers encryption, hashing, browser UI/UX and general cyber security in a way that’s relatable for everyone.