The fact was discovered through the analysis of the latest PayPal-themed spam run that leads to a page hosting the exploit kit.
Users are presented with a “Receipt for your PayPal payment to-Â¦” email, and are urged to verify the details of the payment order by clicking on a link included in the message.
Through a series of redirections, they are taken first to a page booby-trapped with the Blackhole exploit kit, and then to a “Canadian Pharmacy” type of web page:
Whether Blackhole exploits an Adobe Reader, Flash Player, and Java vulnerability is immaterial – it all ends up with users getting infected with malware.
In this case, it’s a Trojan that attempts to steal stored account information used in a number of FTP clients or file manager software; email credentials from email clients; user names, passwords, and hostnames stored in browsers; and tries to access password-protected locations by trying out a hardcoded list of username / password combinations.
It’s also interesting to note that the final destination of the infection chain is a Canadian pharmacy site. The victims who come to the realization that they were duped are “reassured” that it was only spam that leads to such sites, and likely won’t even search for malware infections on their computer.