Community
Interesting item covered by The Register about a huge number of web sites apparently serving up malware. And as yet no one has worked out how they were compromised.
This is a really sneaky exploit - when a user requests the home page from the site, a reference to a local javascript file is included dynamically in the page. The name of the file changes randomly and the file only exists while the user is accessing the page. So it doesn't persist and can't be spotted by admins. The javascript contains multiple exploits to attempt to install a backdoor to your system.
No one has yet worked out how these servers were compromised in the first place. Most of them are running Apache on Unix/Linux - so what sets these apart from the many tens of thousands of hosting servers running the same stuff?
Earlier in the week the estimate was around 10,000 infected sites.
You can read the full story at Scansafe and The Register.
Be careful out there.
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author.
Boris Bialek Vice President and Field CTO, Industry Solutions at MongoDB
11 December
Kathiravan Rajendran Associate Director of Marketing Operations at Macro Global
10 December
Barley Laing UK Managing Director at Melissa
Scott Dawson CEO at DECTA
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.