In association with heise online

18 March 2008, 10:48

Multiple mass attacks on websites

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Criminals are currently carrying out numerous mass attacks in order to infect users' PCs with malware. According to blogger Dancho Danchev, one of the goals is to redirect the DNS settings of infected Windows PCs to malicious name servers. The IP addresses point to the Russian Business Network (RBN).

Using this type of pharming attack, the swindlers can make a domain name resolve to any IP address, thereby directing their victims to phishing sites. There is very little a user can do to completely counter this type of attack.

The attackers' trick is to use the caching of search functions used on many websites to achieve a higher Google ranking. It is possible for additional IFrames to be embedded in Google search results, which are loaded into the browser together with the search result. The victim ends up at a site that offers video codecs or anti-spyware, instead of the expected legitimate site. The malicious site hosts the Zlob trojan that manipulates the DNS entries. Initially, sites like ZDnet Asia fell victim to this search function manipulation. Now apparently many other sites are also affected, including web launches of universities and US government offices.

McAfee has reported mass hacks where the attackers embed a JavaScript in a website instead of IFrames. However, the antivirus vendor's blog entry does not answer the question of how attackers inject the JavaScript into the website. But most of the manipulated websites are based on phpBB. Since the attacks started over a week ago, nearly 200,000 web pages have been compromised. Also, in recent days, sites that use Active Server Pages (ASP) have been attacked with the aim of infecting their users.

In late January 2008, there was a large-scale attack that exploited the servers of US government offices and universities to distribute malware. The advantage for criminals is clear. These sites usually have a good reputation and an adequate number of repeat users. So even surfing on known and trusted sites is no longer adequate protection. Many antivirus vendors are now implementing additional protective measures against drive-by downloads.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-736024
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit