WISH YOU A HAPPY AND SECURE YEAR 2009

Friday, January 30, 2009

Indian embassy website serving malware in Spain

HACKED : Indian embassy website serving malware in Spain

Ad ranking scam or massive malware attack?

By John Leyden

29th January 2009

The compromise of legitimate websites with hostile code ultimately designed to serve up malware onto the PCs continues apace, with the latest victims including the Indian embassy in Spain.

Security researchers Ismael Valenzuela* and later Dancho Danchev* discovered that the the Indian Embassy in Spain was serving malware through an injected malicious iFrame.

The assault represents a rare but not unprecedented assault on diplomatic immunity by hackers. Previous victims of embassy malware attacks in the past include the US Consulate in St Petersburg, The Netherlands Embassy in Russia and the Ukraine Embassy Web site in Lithuania.

Analysis of the Indian Embassy assault by Trend Micro* revealed that the attack was part of a wider code injection push that's either an "advertisement scam or a massive malware attack in its early stages".

The code inserted into the compromised websites injects pages that look like blog entries into the compromised sites' domain, linking to illicit pharmaceutical websites. The purpose of the attack could be either to raise the search engine ranking of malvertised websites or a plot to use the legitimate domains of the compromised websites in order to evade spam filters.

Since the websites involved are already compromised, simply modifying tags would turn the seemingly "non-malicious" injection of code into a full-blown malware attack, Trend Micro warns.

In other separate examples of code injection attacks, the Times of India website was infected by malicious code identified by Sophos as Badsrc-C. The Russian Pravda website has also become infected with malicious scripts, Sophos reports, but fortunately this is not pointing at a website currently serving up further malware.

Circumstantial evidence suggest the three attacks are only related via the use of similar techniques.

"The three attacks are directing people to different malign sites using techniques such as SQL injection, to plant code of legitimate sites left open to attack," explained Graham Cluley, senior technology consultant at Sophos.

* Get details at -

http://ddanchev.blogspot.com/2009/01/embassy-of-india-in-spain-serving.html

and

http://blog.ismaelvalenzuela.com/2009/01/26/embassy-of-india-in-spain-found-serving-remote-malware-through-iframe-attack/

and

http://blog.trendmicro.com/embassy-site-attack-reveals-other-compromised-sites/

5 comments:

Anonymous said...

Good brief and this post helped me alot in my college assignement. Thanks you as your information.

Anonymous said...

Nice brief and this fill someone in on helped me alot in my college assignement. Thank you seeking your information.

Anonymous said...

Understandably your article helped me altogether much in my college assignment. Hats off to you post, choice look progressive for the duration of more interrelated articles in a jiffy as its anecdote of my pet issue to read.

Anonymous said...

Sorry for my bad english. Thank you so much for your good post. Your post helped me in my college assignment, If you can provide me more details please email me.

Anonymous said...

Sorry for my bad english. Thank you so much for your good post. Your post helped me in my college assignment, If you can provide me more details please email me.

This Day in History

Thanks for your Visit