Miscreants are exploiting website vulnerabilities to booby-trap thousands of legitimate sites. The mass attack, thought to be the work of hackers based in China, hit between 2,000 and 10,000 Western servers at the end of last week alone, Russian net security firm Kaspersky Labs reports. Most of the hacked sites run Microsoft ASP …
"Most of the hacked sites run Microsoft ASP technology and are thought to have been hit either using SQL injection attacks "
John this is another attempt at lazy sensationalist journalism to put MS in the security spotlight for a security issue that can't actually be pinned on them for once. As a hoster we're seeing both ASP+MSSQL on Windows *AND* PHP+MySQL on Linux sites being targetted equally.
Yet again you fail to mention that the reasons for sites being susceptable to these compromises is shoddy scripting practices by the web site developers, not a flaw in the technology.
Paris, because she prefers the hot beef injection....
"Notoriously wobbly" may be the best way that anyone has ever described ActiveX. Or anything at all.
Writing like that is what keeps me coming back to El Reg. That and years of deeply engrained habit. But mostly it's the writing.
This week I'll just use my home pc to just play the game and not browse the internet then.
Bad hordehackers bad!
It would have been good if you'd directly mentioned the sites in the kaspersky report in the main story, and recommended blocking them (hosts or whatever). So to quote therefrom:
The link leads to Java Script located on one of six servers – these servers act as gateways for further redirecting of requests. We’ve identified six of these gateways and they’ve been added to the blacklist in our antivirus:
If you’re an admin, you should block access to these sites.
Visiting one of the sites results in a secret redirect to a malicious server called vvexe.com which is located in China. Exploits are then used to launch an attack on the user’s machine.
Or noscript is spiffing. Shame idiot sites use scripting at all, innit?
If anyone can help, why can't these things be blocked at the root dns level. I know it's not immediately effective as it takes time for the dns record (whatever it's called) to trickle down to non-root (whatever they're called) dns servers, but it's something, surely?
"World of Warcraft login credentials"
So, only the anoraks are affected then?
Wrath of the Litch King indeed
Gee -- guess the Gold Farmers are planning on uppin the ante in Litch King.
have had our apps folks beaten up yet again over crap like this on our webservers - thankfully they've finally started to make progress on fixing cruft code.
Helps when the auditors insist on independent vulnerability testing. Better when the testers note that the network and OS layer are just about as solid as can be.
Now -- me n my Gentoo x86_64 and wine are off to eat some hordies in EOTS. And wait patiently for our midnight release copy ......
Your name wins the thread.
Using windows for serious work
It's a big mistake to use Windows to do any "serious" work on the computer.
With all its flaws, it's a matter of time before either their work is wiped, their mailboxes trashed (since most users use outlook express), and their computer hacked - and therefore their bank accounts cleaned.
phishing for domain login details
I had a new type of phishing email a couple of weeks ago which told me my domain site mailboxes were full, and asking me to login with my domain management login details. Looked very good - and made me think for a minute or two before I deleted it - I don't have mailboxes, only mail forwarding, and of course the headers and links were all wrong. I wonder if this was connected in any way with this article's content?
- Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
- China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
- Is that a 64-bit ARM Warrior in your pocket? No, it's MIPS64
- Apple to devs: NO slurping users' HEALTH for sale to Dark Powers
- Apple 'fesses up: Rejected from the App Store, dev? THIS is why