The massive attacks against
hundreds of thousands of Web pages that started earlier this month has spread to
some of the Internet's most prominent sites, including those for
USA
Today,
ABC
News, Target and
Wal-Mart,
researchers said today.
Dancho Danchev, the Bulgarian security researcher who first reported the
attacks two weeks ago, said that the attacks had spread to a long list of
high-profile sites, which have had their search results poisoned with malicious
IFrame code. "The attack's been ongoing for almost a month now," Danchev said in
an e-mail.
According to both a follow-up
post by Danchev to his own blog and analysis conducted by researchers at Symantec
Corp., hackers have inserted IFrame code into the saved search results of an
unknown number of legitimate sites. People who visit those sites and use the
compromised search tool are redirected by the IFrame code to rogue security
software and bogus codec sites, which in turn download malware to the victimized
Windows PCs.
The attack code that eventually ends up on users' machines includes newer
variants of the Zlob Trojan horse, as well as other backdoors and downloaders.
Danchev identified four IP addresses that he claimed host the malicious
files; Symantec backed up his findings. "We have confirmed the attack here at
Symantec," said Joji Hamada, a Symantec researcher, in a short
post to the company's security blog.
The IP addresses Danchev fingered include:
- 72.232.39.252
- 195.225.178.21
- 89.149.243.201
- 89.149.220.85
The four addresses are associated with servers located in the U.S., Panama
and Germany, Danchev said.
"The main IPs behind the IFRAMES are still active, new pieces of malware and
rogue software [are] introduced, hosting for which is still courtesy of the
Russian Business Network, and we're definitely going to see many other sites
with high page-ranks targeted by a single massive SEO [search engine
optimization] poisoning in a combination with IFRAME injections," said Danchev
in his blog post.
When Danchev
raised the alarm earlier this month, the compromised sites included a mix of
both legitimate and questionable URLs, including those for the North Carolina
State University library and the U.S. government's Medicare program, as well as
BitTorrent
sites serving up pirated software.
"In the past, we've seen many low-profile sites being targeted with the
IFrame attack," Hamada added, "but this time the list of hacked sites include
many high-profile sites as well. This is very disturbing, because many big
corporations often go out of their way to protect themselves, yet [they] get hit
like this."
Danchev identified a long list of affected sites, including USAToday.com,
ABCNews.com, News.com, Target.com,
Walmart.com, Bloomingdales.com, WebShots.com, Sears.com, Forbes.com,
Circuitcity.com, Epinions.com, JCPenney.com and those for the University of
Vermont and Boise State University.
Symantec recommended that network administrators block both incoming and
outgoing traffic to the four IP addresses, and Hamada urged IT staffs to take
another sweep through their servers. "It might be a good time for everyone to
audit their servers again," he said.
Users can protect themselves by rejecting any request to download an
unexpected codec or security program.