Potentially malicious proxmox site impersonator
from ueiqkkwhuwjw@lemmy.world to selfhosted@lemmy.world on 26 Oct 11:31
https://lemmy.world/post/37886983

Searching for “proxmox releases” in ecosia I accidentally ended up on the site

proxmax (dot) org/download/

Which I wasn’t able to download anything from but still looks shady AF.

Stay safe <3

#selfhosted

threaded - newest

slazer2au@lemmy.world on 26 Oct 11:46 next collapse

You should report that to google smart screen so chrome browsers throw a red flag.

I also crossposed this to !proxmox@lemmy.world

ueiqkkwhuwjw@lemmy.world on 26 Oct 13:14 collapse

Awesome thanks! Will do.

BCOVertigo@lemmy.world on 26 Oct 13:04 collapse

Typosquat domain for sure! In a sandbox I’m seeing that all the download links point to the same HTML page on a .ink domain that cloudflare is now refusing to serve.

But our buddy joe already got a copy for us so we can at least view that report for fun: www.joesandbox.com/analysis/1763244/1/html

Edit: It pulls down an MSI installer or something it runs with msiexec but disguised with a PDF file extension. It seems to want a copy of cmd.exe to exist in an AutoIT installation (SearchPathW vs “C:\Program Files (x86)\AutoIt3\cmd.exe”) as well as pointing toward the multilanguage (.exe.mui) and other cmd variants. I suspect we’re one step away from a real payload with this report and that’s what we’d see the “Invoke-Obfuscation” powershell the sandbox spotted used for (if that wasn’t a false positive due to the base64 offset string).

ueiqkkwhuwjw@lemmy.world on 26 Oct 13:17 collapse

Interesting analysis, thank you :)

BCOVertigo@lemmy.world on 26 Oct 13:26 collapse

I can’t sleep :(