Thousands hit in broad Web hack

Malicious links were placed on as many as 10,000 servers

Written by Robert McMillan
ComputerWorld
November 7, 2008
Original Article

Hackers have launched a massive Web hacking campaign, putting malicious links on as many as 10,000 servers, security vendor Kaspersky Lab warned on Friday.

"We’re estimating that in the last two days alone, between 2,000 and 10,000 servers, mainly Western European and American ones, have been hacked," Kaspersky wrote on its Web site Friday, "It’s not yet clear who’s doing this."

The attackers are most likely using compromised accounts on the Web sites or launching what's known as a SQL injection attack, in which hackers trick Web sites' software into inadvertently running malicious commands.

The criminals add a line of JavaScript code onto the hacked sites that redirects victims to one of six servers. These sites, in turn, redirect the visitor to a server in China. That server can launch a variety of attacks, targeting known flaws in Firefox, Internet Explorer, Adobe Systems Inc.'s Flash Player and ActiveX, Kaspersky said.

If the victim's computer hasn't been patched, the attack code could install a variety of spyware and Trojan horse software, including one program designed to steal World of Warcraft passwords.

These Web attacks have become fairly common this past year, according to Roger Thompson, chief research officer at AVG Technologies. "These guys are pretty busy," he said via instant message. "We see them a lot."

Judging from their techniques and from his previous research, Thompson said he believes the attackers are college students based in China and that they may be the same group that notoriously hacked the Web sites of the Miami Dolphins and Dolphin Stadium ahead of the 2007 Super Bowl football championship.

Earlier this year, a similar attack compromised more than 1.5 million Web pages, Kaspersky said. "Things are still developing, and the similar nature of the malicious programs used in both attacks lead us to think that this new wave of attacks is potentially pretty serious," it said.

 





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image

 

 

Upgrade to the 3Gweb®
Self-Defending
Web server

before
you get a hit
by
an attacker!

 


image
ting. But first, Callan added, VeriSign wants to get a good look at the new research.

Molnar and his team have communicated their findings to VeriSign indirectly, via Microsoft, but they have yet to speak directly to VeriSign, out of fear that it might take legal action to quash their talk. In the past, companies sometimes have obtained court orders to prevent security researchers from talking at hacker conferences.

Callan said he wished that VeriSign had been given more information ahead of time. "I can't express how disappointed I am that bloggers and journalists are being briefed on this but we're not, considering that we're the people who have to actually respond," he said.

While Schneier said he was impressed by the math behind this latest research, he said that there are already far more important security problems on the Internet — weaknesses that expose large databases of sensitive information to attackers, for example.

"It doesn't matter if you get a fake MD5 certificate, because you never check your certs anyway," he said. "There are dozens of ways to fake that, and this is yet another."





More Links:
image
Contact us for help and product info
image
View our F.A.Q.section
image
Site Map
image

 

 

Upgrade to the 3Gweb®
Self-Defending
Web server

before
you get a hit  
by an attacker!

 


image
/font>被黑客攻击和