What is "vacceedpasian.com"?

Last month, I noticed a bunch of CSP enforcement block actions against https://vacceedpasian.com/conversion.js, and I'm curious if anyone knows what this is. 

CSP stands for "Content Security Policy" and is a mechanism by which web sites can help detect and protect themselves against certain kinds of attacks such as cross-site scripting (XSS). We implement it at Epic Road Trip Planner, and use a trusted third-party service called Report URI to monitor detection and enforcement of attempted violations of our CSP policy. 

You can think of CSP a bit like my spry overgrown puppy of a grand-dog below. Even though he has no clue what his big beautiful brindled beast of a sister even wants over there, he's definitely going to pounce on her to stop her (enforce the CSP), and bark to let me know (send an enforcement report to Report URI). 


Two dogs - the larger brindled dog appears to just be trying to go about her day, and the other, a sleek black pitbull mix, is poised to pounce.

(I know that's a bit of a tortured analogy, but I sure do love these dogs, and I wanted you to see them.)

Screenshot of report-uri.com, showing a table of CSP reports and enforcements of attempted JavaScript injection of https://vacceedpasian.com/conversion.js on Wednesday, September 4


In addition to well-known and obviously nefarious XSS, there are various additional injections - some of them arguably legitimate - that are blocked by good, effective CSP. For instance, the integrated in-app browser from Instagram injects it's own JavaScript into pages, ostensibly for tracking. JavaScript injected by in-app browsers is an entirely different topic, but in any case, it's all intentionally blocked by our CSP at Epic Road Trip Planner in the interest of our users' privacy and security. Ditto browser extensions. We see a significant number of reports and enforcement of in-app browser and browser extension JavaScript injections on Report URI.

In any case, about a month ago, I started noticing an increasing number of enforcement block actions against https://vacceedpasian.com/conversion.js, and so far, I have been unable to determine where they're actually from. I subscribe to a number of threat intelligence alerts, and have not seen any traffic on any of those about it, either. By virtue of it's name, I would GUESS it's injected by any of several browser extensions that serve ads and/or track user behavior, but I'd like to KNOW, and I'm writing this because I couldn't find any information.

Here are a few things I do know:

They appear to be coming from Chrome browsers running on both Windows and macOS. I haven't seen reports from other browsers or operating systems so far.

The domain "vacceedpasian.com" was registered, privately, through Key-Systems GmbH on July 12 - so it's a relatively new domain, and whois won't be able to show who registered it.

Tracing the route to https://vacceedpasian.com shows it being hosted (or at least gatewayed) by Amazon CloudFront and EC2, in Ashburn and Boardman, so it's PROBABLY not Meta, TikTok, Google, Microsoft, Apple or any of the other well-known players there. One notable exception is Amazon itself - I don't yet know how to distinguish between something hosted BY Amazon or AWS vs. something hosted for a third-party ON AWS. 

When I attempt to download the JavaScript file itself, I get a 400 error from nginx/cloudfront, which is unfortunate, but neither surprising nor meaningful to me. 

That's about it, at this point.

If you do happen to know what this JavaScript is, or have suggestions on how to figure this out, please leave a comment below or email security@hillwoodpark.com.

Thanks!

-Tim


Tim Johns
Founder, Hillwood Park

Comments

Popular posts from this blog

Epic Road Trip Planner 2023 Year In Review

It Is NOT Bright Red, It Is NOT Spurting, and YOU ARE NOT GOING TO DIE!

Google Calendar Chart Visualization of A Day in the Life of My Diabetic Daughter