Feeds

Mass compromise powers massive drive-by download attack

Invasion of the password snatchers

Secure remote control for conventional and virtual desktops

More than 10,000 web pages have been booby trapped with malware in one of the largest attacks of its kind to date.

Compromised web pages include travel sites, government websites, and hobbyist sites that have been modified with JavaScript code that silently redirects visitors to a site in China under the control of hackers.

Miscreants likely reprogrammed the web pages after scanning the net for insecure servers.

The malware cocktail attempts to exploit vulnerabilities in Windows, RealPlayer, and other applications to break into insecure PCs, according to an analysis by net security firm McAfee.

Components of the malware attempt to steal passwords to online games while others leave a back door that allows the installation of additional malicious programs.

McAfee Avert Labs first spotted this attack on Wednesday, 12 March. Of the 10,000 pages that were compromised, a number have already been cleaned up.

A single organisation or small group is likely behind this attack, as the malicious code on all these pages is served up from the same server in China.

Craig Schmugar, threat researcher at McAfee Avert Labs, said the attack illustrated that the conventional wisdom that surfers are safe providing they stick to trusted sites (and away from warez and porn) no longer holds true.

"Often you hear warnings about not going to untrusted sites," said Schmugar. "That is good advice, but it is not enough. Even sites you know can become compromised. You went to a place before that you trust, but that trust was violated through a vulnerability that was exploited." ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.