Feeds

Paris Hilton website violated by Trojan-spreaders

That's not hot

Secure remote control for conventional and virtual desktops

Virus authors reportedly planted malicious code on Paris Hilton's website late last week.

Following the attack, surfers visiting the ParisHilton.com site were prompted to install an "update" via a dialogue box. Whether they accepted this update or decided to "cancel" it, a download of a malicious executable was initiated, according to internet reports.

The attack was reportedly used to serve up the Trojan-Spy.Zbot.YETH Trojan, a rootkit trojan designed to steal online banking information and to allow the download of other malicious code.

The assault was detected by web security firm ScanSafe on 9 January but cleansed by Tuesday morning, according to net security firm Sophos, hours after news of the assault broke.

The type of attack thrown against ParisHilton.com is similar to a recent attack on MLB.com, the Major League Baseball website, and the self-explanatory sexy-celeb-photos.com. Each of these assaults was much more in your face than traditional drive-by download attacks, but they also stemmed from the same underlying cause - website vulnerabilities left open to abuse by hackers.

Over the years the hapless Hilton has become a serial victim of various computer hacking and security attacks. Four years ago the notable heiress and airhead was unfortunate enough to suffer from a hack against her T-Mobile account which resulted in the leak of messages, contact details and photos.

Last March another hacker gained access to private pictures after breaking into her Facebook account. And just days ago, messages from a faked LinkedIn profile ostensibly maintained by Ms Hilton pointed to malicious downloads. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?