http://www.bbc.co.uk/news/technology-12933053

1 April 2011 Last updated at 05:34 ET

Sites hit in massive web attack

Hundreds of thousands of websites appear to have been compromised by a massive 
cyber attack.

The hi-tech criminals used a well-known attack vector that exploits security 
loopholes on other sites to insert a link to their website.

Those visiting the criminals' webpage were told that their machines were 
infected with many different viruses.

Swift action by security researchers has managed to get the sites offering the 
sham software shut down.

Code control

Security firm Websense has been tracking the attack since it started on 29 
March. The initial count of compromised sites was 28,000 sites but this has 
grown to encompass many times this number as the attack has rolled on.

Websense dubbed it the Lizamoon attack because that was the name of the first 
domain to which victims were re-directed. The fake software is called the 
Windows Stability Center.

The re-directions were carried out by what is known as an SQL injection attack. 
This succeeded because many servers keeping websites running do not filter the 
text being sent to them.

By formatting the text correctly it is possible to hide an instruction in it 
that is then injected into the databases these servers are running. In this 
case the injection meant a particular domain appeared as a re-direction link on 
webpages served up to visitors.

Reports suggest that the attackers are hitting sites using Microsoft SQL Server 
2003 and 2005 and it is thought that a weakness in associated web software is 
proving vulnerable.

Ongoing analysis of the attack reveals that the attackers managed to inject 
code to display links to 21 separate domains. The exact numbers of sites hit by 
the attack is hard to judge but a Google search for the attackers' domains 
shows more than three million weblinks are displaying them.

Security experts say it is the most successful SQL injection attack ever seen.

Generally, the sites being hit are small businesses, community groups, sports 
teams and many other mid-tier organisations.

Currently the re-directs are not working because the sites peddling the bogus 
software have been shut down.

Also hit were some web links connected with Apple's iTunes service. However, 
wrote Websense security researcher Patrick Runald on the firm's blog, this did 
not mean people were being redirected to the bogus software sites.

"The good thing is that iTunes encodes the script tags, which means that the 
script doesn't execute on the user's computer," he wrote.
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to