Blackhole Exploit Injected into USPS Website
The website of U.S Postal Service served a malware program, previously utilized during an advanced multi-stage assault that resulted in the malware toolkit for Blackhole Exploit, published The Register in news on April 8, 2011.
Reportedly, Zscaler, the cloud security vendor was first to spot this infection on ribs.usps.gov the RIBBS (Rapid Information Bulletin Board System) website of the United States Postal Service (USPS).
Eventually, the drive-by assault exploited software flaws for planting Trojans on visitors' computers that accessed the USPS website, which the cyber-crooks got along with compromising.
Stated Vice President of security research Michael Sutton at Zscaler, it was once again that an authentic website, which was largely visited, was being utilized like an aid for assault. In addition, a very poor identification of the malevolent payloads by desktop anti-viruses that most enterprises regarded as the foremost as also the single means for client-side safeguards, made the assault potent enough to undoubtedly harm a large number of end-users, he explained. SoftPedia published this in news on April 8, 2011.
Lately, according to Zscaler the security company, the same toolkit for Blackhole Exploit contaminated the Internet site of a Houston, Texas-based music festival namely Worldfest. It (the toolkit) acted prominent within the corrupted advertisement, which impacted the Spotify versions supported with ads during the latter half of March 2011.
Nevertheless, USPS took ribs.usps.gov offline that continues to be in that state following the assault. Meanwhile, Web-surfers have been recommended that they should maintain their operating systems and other software up-to-date as well as always have their anti-virus on for scrutinizing Web-traffic.
Related article: Blackhole Attack Toolkit Imitating Zeus Features: AppRiver
» SPAMfighter News - 19-04-2011