Feeds

Infection-by-cache risk unearthed

Caches give malware longer life

Protecting against web application threats using SSL

Malware housed on storage and caching servers, such as those used by ISPs, enterprises, and leading search engines, continues to pose a risk after websites containing malicious code have been pulled.

So says web security firm Finjan, which warns that instead of pointing users towards sites hosting malware, hackers could try to dupe users into visiting contaminated caches. The trick might be used to foil URL filtering products, it says.

"This is more than just a theoretical danger," Finjan chief technology officer Yuval Ben-Itzhak said. "It is possible that storage and caching servers could unintentionally become the largest 'legitimate' storage venue for malicious code. Such 'infection-by-proxy' introduces new risks for businesses and consumers where trusted web addresses become a potential distributor of malicious code - making URL Filtering solutions blind."

Finjan has published obfuscated examples of malware found on storage and caching servers to support its claims.

One well-known hacking tactic involved breaking into vulnerable web servers to install Trojan downloader code, which often takes advantage of browser vulnerabilities to download malware onto target PC (examples here and here). Finjan's point is that users visiting a cached copy of such (potentially mainstream) sites would be infected even if the main site pulled the malware. Search engines are not doing enough to flush their caches, it warns."

Finjan has sent search engines and service providers technical details of its discovery, uncovered by Finjan's Malicious Code Research Centre (MCRC) during its quarterly security trends analysis, and is continuing its dialogue with these firms in the hope of nipping the problem in the bud.

Finjan's net security report, which also discusses the increased use by hackers of Web 2.0 technologies to upload malware and the illicit trade in exploit code, can be found here (registration required). ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.