The web of darkness

2010-01-01

Costin Raiu

Kaspersky Lab, Romania
Editor: Helen Martin

Abstract

'There are now over 100 times more infected websites on the Internet than three years ago.' Costin Raiu, Kaspersky Lab.


One of the marked trends in the world of cybercrime is the distribution of malware via the World Wide Web. While email worms such as Melissa wreaked havoc in the early years of the last decade, in recent years, the web has become the main distribution point for malware. Malicious programs are hosted on websites; users are then either tricked into running these programs manually, or exploits are used to execute the malware automatically on victim machines.

At Kaspersky Lab, we’ve been monitoring this trend with growing concern. In 2006, we designed and deployed a project called PatroKLes. PatroKLes monitors the web space for infections that are hitting high-profile websites.

There has been a sharp rise in the number of infected websites from roughly one in every 20,000 or so in 2006 to one in every 150 at the beginning of 2009. The number of infected sites now fluctuates around this number. This may mean that saturation point has been reached – all the websites that can be infected have been infected. However, the number rises and falls as new vulnerabilities and tools are discovered that allow attackers to take over new hosts.

In practice, one infected site in every 150 means that a new computer user will hit an infected website after only a few days of regular browsing. Sometimes it will happen even sooner, as search engine optimization (SEO) is often used to drive traffic to malicious websites.

In 2008, the malware most commonly detected on infected websites was Trojan-Clicker.JS.Agent.h, closely followed by Trojan-Downloader.JS.Iframe.oj. There were two very interesting cases in 2009, the first of which was Net-Worm.JS.Aspxor.a. Although this malware was first back in July 2008, it became far more widespread in 2009. It uses a kit which finds SQL injection vulnerabilities in websites which are then used to insert malicious iframes.

Another very interesting case is Gumblar, named after the Chinese domain that was used as an exploitation point. The ‘gumblar’ string, visible in the obfuscated JavaScript which is added to websites, is a clear sign that a website has been compromised. The ‘gumblar.cn’ domain, which was originally used in these attacks, has been taken down, but the bad guys have since switched to new domains.

Once an infection is identified, we attempt to inform the owners. We provide assistance with identifying the malicious code in the page, as well as suggestions on how to secure the server in the future. Unfortunately, we rarely hear back from the owners of these sites. Moreover, there are cases when the owners reply, but do not clean the infection.

Over the past three years, the number of legitimate websites that have been infected with malware has grown at an alarming rate. There are now over 100 times more infected websites on the Internet than three years ago. High-profile, high-traffic websites are a valuable commodity for cybercriminals, as there will be large pools of potential victims that can be infected via such sites. Our experience indicates that the owners of these websites are rarely aware of the infections, and when they are aware, they seldom know how to handle them: in some cases, sites have remained infected for years.

A lot of infections seem to arise through vulnerabilities in old versions of various CMS packages, ranging from PHPBB to WordPress. Yet, based on feedback we have received, the majority of website infections occur via stolen account credentials. Web developers or others with login credentials for the website get infected with a password-stealing trojan and the details are used to inject malware into the website. The sad fact is that most of these people are either using an outdated/pirate security suite, or are not running one at all.

In the end, it all comes down to the same basic points: most people are not running security solutions and most people do not really care when they get infected.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.