Skip to main content

Crunchyroll.com Hijacked, Distribute Malware

Crunchyroll.com was taken offline this morning due to a hack that caused visitors to be prompted to download a desktop version of their software. This software, though, was not as it seemed because it also included malware that was installed along with it.

When the Crunchyroll staff in Germany woke up this morning they were greeted with news that something was not quite right with the site. Due to this they started issuing alerts telling visitors to stay away from the site for the time being.

And for our English-speaking audience
Please DO NOT access our website at the current time. We are aware of the issues and are working on it

— Crunchyroll.de (@Crunchyroll_de) November 4, 2017


While the hack was ongoing, visitors were greeted with a prompt to download and try a new desktop application. This desktop application was not one offered by the site themselves, but one being offered by the hackers in order to distribute malware.

Crunchyroll.com During the Hack
Source: Reddit

According to Crunchyroll, the site itself was not hacked, but rather was the victim of a DNS hijack of some sort. Whether his DNS hijack caused a clone of the site under the attacker control to be shown to visitor or some other redirect is currently unknown.

Update: We have NOT been hacked. At the moment, it appears to be DNS hijacking.

— Crunchyroll.de (@Crunchyroll_de) November 4, 2017


BleepingComputer has contacted Crunchyroll for more details regarding the hack, but at the time of this writing have not heard back.

According to the site's twitter feed, the issue has been resolved, Crunchyroll is back online, and its safe for visitors once again.

So what exactly was installed by this malicious download?

When the offered program was downloaded and executed, it would extract an embedded base64 encoded file to %AppData%\svchost.exe and execute it. You can see the base64 encoded file in the screenshot of the offered Crunchyroll.exe file below.

Embedded Base64 Encoded File

When the malicious executable starts, it will create an autostart called Java that launches the %AppData%\svchost.exe program when the victim logs into the computer. 

Unfortunately, it is not currently known what this malicious executable does at this point. According to a detailed writeup by security researcher Bart Blaze, he feels that it may be a keylogger. As more information becomes available about the malware, we will update this article.

How can you remove the Crunchyroll related malware?

Thankfully, removing the malware distributed by the Crunchyroll hack is fairly easy. The only issue is that this malware is not currently detected by many security vendors, so we will need to perform manual removal steps.

Open the Windows Registry Editor by typing regedit in the Start Menu search bar. When you see regedit.exe or Registry Editor in the search results, click on it to launch the program.
 When the Registry Editor is open, navigate to HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Runand single-left click on the Run key. You should now see in the right pane a value called Java as shown below.

Java Registry Value

Now right-click on the Java entry and select Delete as shown in the image below.

Delete Value

When it asks you to confirm that you wish to delete the value, click on the Yes button.
 Now reboot your computer and when you log back in, the malware executable will no longer be started.
 Now navigate to the %AppData% (Typically C:\users\[user_name]\appdata\roaming) folder and you should see a program called svchost.exe.

Svchost.exe in AppData Folder

Right-click on this file and select Delete to delete it from the computer.
 Now perform a scan using your installed security software. If you do not have a security software, now may be a good time to install one.
 If this malware was indeed a keylogger, you may also want to consider changing the password to any sites that you logged into after installing this fake Crunchyroll program.

Your computer is now clean from the malware related to the Crunchyroll hack.

Comments

Popular posts from this blog

Floyd Mayweather Baby Mama Sues for $20 Mil ... He's a Despicable Liar

Floyd Mayweather could lose tens of millions of dollars from his big payday if his baby mama gets her way ... because she's just filed a lawsuit claiming he ruined her with lies to save his own ass. Josie Harris, who has 3 kids with Floyd, claims he lied through his teeth in an interview with Katie Couric just 2 weeks before the big fight ... when he claimed Josie was in a drug-fueled rage and he had to "restrain" her during their infamous 2010 domestic violence incident. Point of fact ... Floyd was convicted of domestic violence and spent two months in jail. Josie recounts her terror in the lawsuit, explaining how she and Floyd had broken up ... but he flew into a jealous rage that night, broke into her home and viciously attacked her while she was sleeping on her couch ... and her kids saw part of the beating. Harris says she is now labeled a drug addict thanks to Mayweather's lies -- and was embarrassed and humiliated on a global scale.   Her lawyer, Dan Friedl...

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google, harder to search for results from other countries

For a long time, there was an easy way to conduct a Google search in a country other than the one you’re in. If you wanted to get results specific to Japan, for instance, you would visit www.google.co.jp; to get Australian results you would visit www.google.com.au — but this trick no longer works. Google has announced that it will now always serve up results that are relevant to the country that you’re in, regardless of the country code top level domain names (ccTLD) you use. The reason given is a little bizarre. The search giant says that the change has been introduced because of the way people are using the search engine these days. It says: “around one in five searches on Google is related to location, so providing locally relevant search results is an essential part of serving you the most accurate information.” The argument seems counterintuitive, however. Anyone who has changed the ccTLD has done so consciously, and for a reason — for Google to override this decision is strange...