Multiple Popular Websites Affected By EyeWonder Malware Incident
According to ZDNet, during the last couple of hours, visitors of popular and high trafficked web sites such as CNN, BBC, Washington Post, Gamespot, WorldOfWarcraft, Mashable, Chow.com, ITpro.co.uk, AndroidCommunity, Engadget and Chip.de, started reporting that parts of the web sites are unreachable due to malware warnings appearing through the EyeWonder interactive digital advertising provider.
According to Google’s SafeBrowsing advisory for EyeWonder, the exploits were hosted on currently active and participating in the Cold Fusion injection attack domains, namely elfah .net, 2ici .cn and javazhu.3322 .org – the following have also managed to compromise Pakistan’s Telecommunication Authority.
By using RealPlayer Import stack overflow exploit and another one attempting a QVOD Player URL overflow, the cybercriminals then attempt to push eight different malware samples. Detection rates for the droppers are improving.
Interestingly, one of the malware samples attemps to download the updated list of malware binaries by connecting a compromised Italian site part of the Cold Fusion injection attacks (betheboss.it) since it appears to have been exploited in such a way.
This malware incident demonstrates how a single exploitation of a trusted third-party content/ad serving vendor can not only undermine its credibility, but potentially the credibility of the sites using the network. And since the ads on the affected sites are dynamically served through different networks, it remains questionable whether it was in fact EyeWonder that served malicious content, or a compromised partner of the network itself.
Case in point – the partnership between Facilitate Digital and EyeWonder comes in a very insecure fashion with EyeWonder having a permanent iFrame tag loading a domain (adsfac.us) belonging to Facilitate Digital on its front page.
For the time being, EyeWonder.com remains down for maintenance.
Credit: ZDNet.com Security Blogs
More on CyberInsecure:
July 4th, 2009 at 8:31 pm
Apparently, the exploit only affected the home page http://www.eyewonder.com and not any advertising, which was hosted on a different server (which can be verified by traceroutes). The warnings on other sites were simply because Google flagged *.eyewonder.com
It looks like Eyewonder has fixed the issue caused by the hack into Coldfusion on their home page and Google has unflagged them.