CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
January 27th, 2009

International Electrotechnical Commission Website Compromised, Redirect Exploits Internet Explorer, QuickTime And AOL SuperBuddy

Websense Security Labs has discovered that a subdomain of the International Electrotechnical Commission (IEC) Web site has been compromised. The IEC is an international standards organization that prepares and publishes International Standards for all electrical, electronic, and related technologies. Member countries include Japan, Australia, U.S.A., central European countries, and numerous others.

The infected subdomain belongs to the TC26 group. Unprotected users would be subjected to execution of obfuscated Javascript that redirects to an exploit site, hosting exploits for Internet Explorer, QuickTime and AOL SuperBuddy. Successful execution of the exploit code incurs a drive-by download and installs a backdoor on the compromised machine. Major antivirus vendors are not detecting this payload at this time.

Credit: Websense Security Labs™ ThreatSeeker™ Network

Share this item with others:

More on CyberInsecure:
  • Sections Of PBS.org Website Hijacked, Serving A Cocktail Of Dangerous Exploits
  • Internet Explorer 0-day Malware Infects Amnesty International Hong Kong Website Visitors
  • Apple QuickTime Multiple Remote Vulnerabilities
  • Asprox Botnet Mass Attack Hits Governmental, Healthcare, and Top Business Websites
  • AOL Hosted Sites Distribute Malware

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: International Electrotechnical Commission Website Compromised, Redirect Exploits Internet Explorer, QuickTime And AOL SuperBuddy

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.