Feeds

Adobe redirects web surfers to nefarious links

Six days of Serious Magic Malware

Providing a secure and efficient Helpdesk

Adobe has been caught hosting a web page that redirects unsuspecting visitors to websites that attempt to install malware on vulnerable machines. The company was informed of the problem on Friday, but six days later, it still hasn't been fixed.

The infection, which resides at hxxp://www.seriousmagic.com/help/tuts/tutorials.cfm?p=1, instructs users browsers to silently install a malicious file from a series of domains known to host attack sites. Adobe announced its acquisition of Serious Magic two years ago and whois records indicate the company is the owner of the seriousmagic.com domain.

According to this post from anti-virus provider Sophos, Adobe was notified of the infected page on Friday. The Register visited the link (using a virtual machine, of course) on Thursday and found it was still trying to redirect users to a series of nefarious sites including hxxp://abc.verynx.cn/w.js and hxxp://1.verynx.cn/w.js. While those links no longer appeared to be active, two other sites used in the attack, hxxp://jjmaobuduo.3322.org/csrss/w.js and hxxp://www2.s800qn.cn/csrss/new.htm, were still active at time of writing.

Screenshot of infected page at seriousmagic.com

This redirection brought to you by Adobe

The sites are associated with the malware Sophos dubs Mal/Badsrc-C. It spreads by infecting legitimate sites using so-called SQL injections. Such attacks take advantage of web developers who write SQL database applications that accept user-supplied data without inspecting it for malicious characters. They work across a broad array of web applications.

An Adobe spokesman said the company was looking in to the matter.

With Fortune 1000 companies such as Adobe punting malicious links, it's no wonder security experts estimate that more than half of the websites hosting malware were legitimate destinations that had been hacked. Sensitive government websites on both sides of the Atlantic have also been commandeered over the past year.

So next time you discount a vulnerability in your favorite browser or music player because it requires the user to be lured to a website under the control of an attacker, remember the scenario isn't as far-fetched as it seems. With a little help from sites like Adobe, the bad guys just may have their way with you. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.