Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Fresh Assault Modification Found on Human Rights Internet Site

The conventional drive-by download assaults typically have malware loaded onto Internet sites. Characteristically, this malware diverts Web-surfers onto a website harboring exploit that abuses browser security flaws alternatively other attack codes for downloading and running malicious software on visiting computers. The Register published this on April 19, 2011.

One such drive-by download assault was targeted on the Amnesty International website that Armorize a security company spotted during when several separate events occurred serially. The assault utilized vicious scripts for locating the malicious code that already existed within the Web-browser's repository prior to running it.

This form of assault has been observed for a long while, elaborates CEO Wayne Huang of Armorize. Security published this on April 19, 2011.

The drive-by-repository assaults first came to be noticed during early 2011 and there's a minimum of one cyber-gang utilizing an exploitation of this manner. The gang, which's fresh, targets chiefly government and human rights websites.

The so-called drive-by-repository method causes difficulty in spotting attackers as there's no effort for pulling down a file along with copying it to the hard-drive, a dodgy operation that several security applications have the responsibility to spot. However, once the dodgy operation succeeds, criminals have a better chance for injecting their malware through the evasion of security detection.

Anti-virus products are largely likely to spot these assaults in a couple of ways. One, incase malware is pulled down onto a system, while it maps to a signature, the AV program will spot and eliminate it. Else, when shellcode is launched as also an intermediary party is accessed for pulling down malware it'll start off behavioral safeguards thus foiling the assault.

Nevertheless, this process changes with drive-by-repository assaults wherein even prior to the attack code that seeks to abuse software vulnerability gets installed, the malevolent payload gets loaded onto the computer. And while the attack code eventually gets unleashed, and incase turns out successful, there'll occur the execution of shellcode and the running of its malevolent payload within the browser straight from the computer's repository.

Meanwhile, the Amnesty International online-site is for the second instance having its visitors under attackers' seize.

Related article: Fark.com Files Suit against Suspected Hacker from Fox13

ยป SPAMfighter News - 4/28/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next