[VIM] Department of Homeland Security website hacked! (fwd)
security curmudgeon
jericho at attrition.org
Tue Apr 29 08:49:05 UTC 2008
Be curious to search Google for the string and try to determine how many
of these sites were vulnerable, but NOT running custom-built sites, rather
running COTS that happen to be vulnerable.
---------- Forwarded message ----------
From: InfoSec News <alerts at infosecnews.org>
http://www.theregister.co.uk/2008/04/25/mass_web_attack_grows/
By Dan Goodin
The Register
25th April 2008
The sophisticated mass infection that's injecting attack code into
hundreds of thousands of reputable web pages is growing and even
infiltrated the website of the Department of Homeland Security.
While so-called SQL injections are nothing new, this latest attack, which
we we reported earlier, is notable for its ability to infect huge numbers
of pages using only a single string of text. At time of writing, Google
searches here, here and here showed almost 520,000 pages containing the
infection string, though the exact number changes almost constantly. As
the screenshot below shows, even the DHS, which is responsible for
protecting US infrastructure against cyber attacks, wasn't immune. Other
hacked sites include those belonging to the United Nations and the UK
Civil Service.
The attack causes infected sites to redirect visitors to destinations that
attempt to install malware on vulnerable machines. At time of writing, the
malicious payloads attacked vulnerabilities that already have been
patched. And in any case all three of the redirection sites were down,
possibly because they were unable to handle the demand. But should the
attackers get their hands on a newer exploit - say, one targeting a
zero-day vulnerability in QuickTime - it would be relatively easy for them
to swap out the payload.
One reason the infection has spread so widely is the attackers have
managed to find a single attack string that seems to work on tens of
thousands of different sites. Most web applications are custom -built for
a particular site, so attackers likewise have to custom design attack
parameters to exploit weakness. Not so here.
"These guys look like they've found a methodology to get a successful SQL
injection generically across [many] websites," said Jeremiah Grossman, CTO
of WhiteHat Security, which helps companies secure web applications. "That
right there is like a skeleton key."
[..]
More information about the VIM
mailing list