Feeds

Government websites invaded by smut and spyware

Redirection ruse used to peddle smut bazaars

Providing a secure and efficient Helpdesk

A slew of government organisations and corporations are unwittingly helping hackers promote porn sites.

Targets as diverse as the Marin County Transportation Authority website in California and the Bank of Ghana have been unwittingly playing host to code that redirects surfers to smut as a result of insecure systems.

The tactic is aimed at increasing the search engine ranking of skin flick sites. The offending content is normally hosted elsewhere. However, some of the dodgy pages on compromised corporate servers attempt to install malware onto the PCs of visitors.

A (safe to view) sample html page featuring in this type of attack can be found here.

Typically, the pornographic redirects are hidden deep within the sites. Pages redirecting to smut sites were located via a Google search in directories normally reserved for staff reports on the Marin County website, for example. The front pages of the attacked sites remain unaltered.

Brookhaven National Labs was discovered to be harbouring redirections to pornographic sites last week. It promptly cleaned up its act.

The initial attack on the Marin County Transportation Authority website prompted a temporary shutdown and cleanup operation on all California government websites on 2 October. Despite this, the site was compromised again late last week.

The site was purged on Monday, although how long it stays that way remains to be seen.

The Bank of Ghana website still harbours redirections to porn site.

Anti-spyware firm Sunbelt Software has being closely monitoring the attacks, chronicling its observations on its security blog.

Alex Eckelberry, president and chief exec of Sunbelt, told El Reg that the porn redirection ruse is a common tactic. "These sites were, or in some cases still are, hosting code that does redirections to pornographic sites. Gangs are doing this to inflate search engine results. It's similar to, but more aggressive than, link comment spam," he added.

It's unclear what vulnerabilities were used to compromise the affected sites. DNS hacks, open admin portal (the suspected cause of the initial Marin County attack), or simply poorly patched systems are all possibilities.

"The hackers have automated bots that look for these vulnerabilities. It's hard to pin the cause down to any one thing but we think the same group was involved in the attacks on both Marin County and the Bank of Ghana, based on the sites that are being promoted," Eckelberry explained.

Small municipal organisations, such as the Marin County Transportation Authority, outsource their websites. Eckelberry says poor security policies by some hosting firms can contribute to the problem.

"These redirection uploads happen all the time. The problem is rife on university sites, for example. What happened to Marin County earlier this month, which led to a state-wide cleanup operation of government sites in California, should act as a wake-up call," he added. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.