Skip to main content
Blog > Posts > SANS solves mystery of mass Web site infections
SANS solves mystery of mass Web site infections

By Jeremy Kirk , IDG News Service , 04/17/2008

 
The SANS Institute has uncovered what they've termed a "rare gem" as far as computer security investigations go that sheds new light on how up to 20,000 Web sites have been hacked since January.

They found a sneaky software tool that uses Google's search engine to hunt for Web sites running certain kinds of vulnerable applications, wrote Bojan Zdrnja, on the institute's blog.

"While we had a general idea about what they do during these attacks, and we knew that they were automated, we did not know exactly how the attacks worked, or what tools the attackers used," Zdrnja wrote.

When the tool finds a site that is vulnerable, it kicks into action. "The exploit just consisted of an SQL statement that tried to inject a script tag into every HTML page on the web site," Zdrnja wrote.

That SQL statement was crafted to target Web sites running Microsoft's Internet Information Server and SQL Server. Once compromised, the Web sites were then rigged to serve malicious software to visitors using JavaScript, which tried various exploits based on known software vulnerabilities.

Among the malicious programs served up was a password-stealing program for the game "Lord of the Rings Online," security vendor McAfee said last month.

SANS said the software tool also reports to a server based in China, a feature that may be used to count the number of infections in order for the person using the tool to get paid, Zdrnja wrote. The tool may have other functions, but SANS is still analyzing it.

Among the victims from these attacks were the Web sites of security vendor Trend Micro as well as CA.

Comments

The Protectors Potentially Infecting the Unprotected

Imagine that!  Unfortunately, only the tip of the iceberg seems to be known about this exploit.  One would think that there have been a lot of Trend Micro and Computer Associates clients that may have been infected by visiting their sites!  This is the very thing that we keep hearing that the "trusted" sites are poorly protected, get hacked, then become distribution points for malware.  You should really get this out to as many network security managers as you can!  Too many security personnel underestimate the hazards.
lesterp@wsn.net at 4/28/2008 7:52 PM

Server In china

I have recently read that "junior level" hackers in China get paid on a piece rate basis for each successful hack and SQL injection.  I guess they just kept trying until the hacked into Trend Micro and CA.

I keep hearing that many "trusted" web sites are poorly protected so the hackers know how to exploit vulnerabilities.
jonr@wsn.net at 4/29/2008 8:58 AM

Follow us on Twitter