CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
May 30th, 2009

Mass SQL Injection Compromises More Than 20,000 Web Sites

An infection that attempts to install a potent malware cocktail on the machines of end users has spread to about 30,000 websites run by businesses, government agencies and other organizations, researchers warned Friday.

The infection sneaks malicious javascript onto the front page of websites, most likely by exploiting a common application that leads to a SQL injection, said Stephan Chenette, manager for security research at security firm Websense. The injected code is designed to look like a Google Analytics script, and it uses obfuscated javascript, so it is hard to spot.

The malicious payload silently redirects visitors of infected sites to servers that analyze the end-user PC. Based on the results, it attempts to exploit one or more of about 10 different unpatched vulnerabilities on the visitor’s machine. If none exist, the webserver delivers a popup window that claims the PC is infected in an attempt to trick the person into installing rogue anti-virus software. The executed malware file has a very low AV detection rate.

The rogue anti-virus software uses polymorphic techniques to constantly alter its digital signature, allowing it to evade detection by the vast majority of legitimate anti-virus programs. Because it uses obfuscation, the javascript is also hard to detect by antivirus programs and impossible to spot using Google searches that scour the web for a common string or variable.

According to Chenette, “For the common user, it’s going to be possible but difficult to determine what the code is doing or if it’s indeed malicious. We can see this quickly growing.”

The infection shares many similarities with a mass website malady that’s been dubbed Gumblar. It too injects obfuscated javascript into legitimate websites in an attempt to attack visitors. So far, it’s spread to about 60,000 sites, Websense estimates.

Several differences in the way the javascript behaves, however, have led Websense researchers to believe the two attacks are unrelated.

The researchers have also noticed that the code, once it’s deobfuscated, points to web addresses that are misspellings of legitimate Google Analytics domains that many sites use to track visitor statistics. The RBN, or Russian Business Network, has used similar tactics in the past, and Websense is now working to determine whether those responsible for this latest attack have ties to that criminal outfit.

“It could be that the RBN is related, or more likely because that code was publicized, the attackers are acting in a very smart fashion to duplicate methods of old attacks to hide their tracks,” Chenette explained.

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • Apple.com Hit In Latest Mass Hack Attack
  • Mass SQL Injection Attack Infects Over 28,000 Pages, Including iTunes Podcast
  • Almost 300,000 Webpages Infect Visitors Through Invisible IFrame Link
  • New Lateral SQL Injection Method To Hack Oracle Database
  • Savannah Free Software Collaborative Development Platform Hacked, Accounts Compromised Through SQL Injection

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Mass SQL Injection Compromises More Than 20,000 Web Sites

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.