Feeds

Forth Road Bridge hack redirects to smut bazaar

Firth and degradation

The Essential Guide to IT Transformation

Updated Hackers turned the Forth Road Bridge website into a filth jamboree after breaking into its systems to plant script designed to redirect surfers to a Turkish site hosting malware.

According to Scottish security outfit Roundtrip Solutions the website of the Forth Estuary Transport Authority (www.feta.gov.uk), which runs the famous suspension bridge in central Scotland, was hacked in order to serve up pop-up ads for porn sites. Roundtrip used AVG's LinkScanner security tool to determine that hackers were taking advantage of the (old and a little obscure) MDAC-RDS ActiveX exploit to launch an iFrame HTML element taken from a website under the control of hackers.

As a result users with unpatched Windows PCs visiting the site during the week or so before the problem was put right on 6 February were liable to end up with systems loaded with malware, according to an analysis by Roger Thompson of AVG's Exploit Prevention Labs. Both Roundtrip and Thompson, which assisted the Scottish firm in its analysis, reckon the Neosploit Hacking Toolkit was used to carry out the attack.

Analysis of the site revealed the exact mechanism of the ruse. "The exploit code was found fairly easily: the obfuscated JavaScript made it stand out like a sore thumb," Roundtrip reports. "This code made the browser connect to a server in Turkey with an IP address of 88.255.90.130. Most of the time this server returned instructions to look at the BBC website, but occasionally it delivered another JavaScript payload, which could have done anything it liked."

FETA took down the website soon after being notified of potential problems on Wednesday. The site was back online by late Wednesday afternoon, after it was rebuilt. "We took our website off-line for a few hours this [Wednesday] morning as a precautionary measure after a security breach on the servers of the external company that hosts the FETA website," a FETA spokesman explained. "The issue has now been resolved and the web hosting company is reviewing their security arrangements". ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.