Hacked Texas National Guard site serves up malware

The Web site attacks unpatched PCs, plants rootkit, offers fake security software.

Written by Gregg Keizer
ComputerWorld
September 18, 2008
Original

Attackers have hacked the Web site of the Texas National Guard and are using it to serve up offers of fake security software and plant rootkits on unpatched PCs, a security researcher said today.

The National Guard's site was hacked sometime before yesterday, said Roger Thompson, the chief research officer of Czech Republic-based security vendor AVG Technologies Cz SRO. Thompson confirmed Thursday that the site was still pushing phony antispyware software and infecting users with a rootkit.

"It's still infective," Thompson said today in an instant message exchange. "I did a refresh, and [it] whacked me."

A spokeswoman for the Texas National Guard, Chief Master Sergeant Gonda Moncada, acknowledged the hack midday. "We are aware of the situation and are working hard to fix it," she said in an e-mail.

According to Thompson's original analysis, malicious code planted on the agency's site sends the visitor's browser to the hacker site. "[That's] probably in Russia," said Thompson, "[but I] can't confirm it, because the ISP for the host is not answering whois queries."

The malicious site tries to trick users into forking over money for fake security software, said Thompson. "If you're not patched, when you close your browser, you find that your desktop has changed," he said, referring to a pop-up message that claims the user's PC is infected with spyware.

"This machine is now hopelessly nailed, and code has been installed in the background, and their pitch is that they'll remove it for a mere $49.95, and insert your credit card number here, please," said Thompson.

In the background, the attackers also plant a rootkit, software that hides malware to make it tougher for legitimate security software to sniff out and snuff attack code.

Moncada did not respond to other questions, including when the site would be cleansed of the malicious code and how it had gotten onto the site.





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image
image
lt="image">
View our F.A.Q.section
image
Site Map
image
image
-link.jpg" width="125" height="1" vspace="6" alt="image">
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image
image
formation to attackers, for example.

"It doesn't matter if you get a fake MD5 certificate, because you never check your certs anyway," he said. "There are dozens of ways to fake that, and this is yet another."





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image

 

 

Upgrade to the 3Gweb®
Self-Defending
Web server

before
you get a hit  
by an attacker!

 


image
/font>被黑客攻击和