BusinessWeek site attacked, turned into malware playground

GMagazine's site suffers a major SQL injection attack

Written by John E. Dunn
ComputerWorld
September 15, 2008
Original

The Web site of BusinessWeek magazine suffered a major SQL injection attack in recent days that left it hosting malware on hundreds of its pages, security vendor Sophos PLC has reported.

Once compromised by such a server hole, the attack scripts could, in principle, launch anything desired by the attacker except currently included code for automatic attacks based on JavaScript. That means a visitor could be hit by malware just by landing on one of the pages, without even interacting in any way.

Luckily, according to Sophos, the code that's still on the magazine site pointed to a Russian site that appeared to be nonfunctioning -- although leaving the code in place meant it could be reactivated at any time.

"BusinessWeek needs to get rid of these hundreds of pieces of malicious script as soon as possible, before a hacker puts malware up which would be activated by them," said senior technology consultant Graham Cluley at Sophos.

The compromised part of the site is used by the magazine to advertise jobs to MBA graduates.

"BusinessWeek and the many other firms hit by SQL injection attacks need to move fast to not only remove the malicious scripts, but also to ensure that they do not get infected again. Companies whose Web sites have been struck by such an attack often clean up their database only to be infected again a few hours later," said Cluley.

Sophos has posted a video on its site that runs through the BusinessWeek attack in more detail. In the video, Cluley points out that the attackers wouldn't have needed to target BusinessWeek specifically to have found the vulnerability from which the attacks sprang -- a search engine could have been used to hunt down the vulnerable code.

Sophos is now finding 16,000 new malicious Web pages every day, 90% of which were being hosted from legitimate sites, he said.

A similar attack was used earlier in 2008 to undermine 500,000 legitimate Web sites in a period of days.





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image
image
image
-link.jpg" width="125" height="1" vspace="6" alt="image">
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image
image
formation to attackers, for example.

"It doesn't matter if you get a fake MD5 certificate, because you never check your certs anyway," he said. "There are dozens of ways to fake that, and this is yet another."





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image

 

 

Upgrade to the 3Gweb®
Self-Defending
Web server

before
you get a hit  
by an attacker!

 


image
/font>被黑客攻击和