Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Lilupophilupop SQL-insertion Assault Compromises more than 1m Websites

The SANS ISC (Internet Storm Center), during the final weekend of 2011, estimated that the allegedly known lilupophilupop.com malicious software alternatively the SQL-insertion assault by lilupophilupop.com lately struck a total 1,070,000 URLs. The number is greater than the 80 web-pages the Center counted during early-December 2011, says Mark Hoffman, handler at SANS ISC. Darkreading.com published this on January 5, 2012.

Indeed, it seems that the attackers hijack websites through SQL-insertion using the ">" string that targeted websites all over the world when the majority of contaminations (123,000) occurred within the "NL" domain of The Netherlands along with a few .org and .com websites too.

Moreover, the assault initially appeared wholly automated, while proliferating fast; however, according to Hoffman, currently it appears as partly automated and partly hand done. The hand done part as well as the total number of websites contaminated indicates that the attack's preparation took a long time alternatively a good number of workers were behind its execution, he analyzes. Help Net Security published this on January 5, 2012.

Giving further information about the SQL-insertion assault, Senior Security Researcher Mary Landesmann of ScanSafe, a unit of Cisco stated that the over 1m web-address count possibly was exaggerated. For, that count might even contain the web-pages which talked abut the attack. Consequently, there was forever an enormous increase in URLs infected, following the occurrence of the first instance public report. That implied that counting any search engine results wasn't an appropriate way of evaluating a compromise's size, Landesmann explained. Darkreading.com reported this.

Interestingly, for some cyber-criminals, a huge instance of SQL-insertion assaults is the best method for disseminating malware scams wherein the effort put is the minimum. Clearly, the contamination proliferates as fast as plague while it easily hijacks all the unprotected sites for fulfilling a malevolent campaign.

These hijacked websites have a problem i.e. they're often those getting a large number of visitors. Therefore, if these visitors are provided fake AV programs they may feel lured towards installing them, thereby letting online crooks to reap enormous cash from less-savvy Web surfers who actually become convinced that their computers have an infection.

ยป SPAMfighter News - 1/13/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next