Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Trojan Script Becomes Glued to Super Glue Website

According to a warning by security company Avast Software, before eliminating malevolent redirection scripts, people who visited the globally popular Super Glue's website were diverted onto another that thrust crud. Also, the company further warned that the website -supergluecorp.com remained contaminated for no less than 5 days starting August 5, 2011 and during that period Web-surfers were diverted several times to finally land onto a payload that was then dormant. TheRegister published this in news on August 10, 2011.

Reportedly, when diverted again and again, the Web-surfers were channeled through several intermediary sites that were based in Russia. Thereafter, the landing website, also hosted in Russia, probably triggered a scareware campaign although any other mischief couldn't be ruled out. People visiting Super Glue were put in danger till the time the adhesive manufacturer, on August 11, 2011, fixed the problem.

Avast warned that one drive-by download had infected the firm's online site that contaminated visitors with a redirector Trojan of JavaScript. According to the company, the problem has been notified to Super Glue.

Meanwhile, virus lab examiner Alena Varkockova at Avast stated that the JavaScript crafted one URL on cameoprincess.com, which formulated a tag for essentially starting off the code through the particular URL. According to her, the 'cameoprincess.com' site carried one JavaScript code that repeatedly diverted visitors. And when diverted for the last time, the visitors landed on the payload page, however, it was disabled at least then. Moreover, through the utilization of many redirectors, it wasn't possible for determining the exact malicious payload statistically, although Alena stated that it could probably be a sample of rogue AV. SCMagazine published this on August 10, 2011.

Meanwhile, contaminated JavaScript redirectors/downloaders are known to represent a widely adopted assault technique, but the particular AVF Trojan virus hitting the website of Super Glue doesn't. As per Alena, although the Trojan had hit more than 500 websites on August 10, 2011, it wasn't among the 50 most prevalent malware. TheRegister reported this.

Nevertheless, Avast Software stated that the infection had been notified to Super Glue that apparently had cleaned the stuff on the day of reporting.

Related article: Trojans to Target VoIP in 2006

ยป SPAMfighter News - 22-08-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next