Microsoft's IIS Web server may be to blame, says researcher
Attacks on legitimate Web domains, including some belonging to the United Nations, have expanded dramatically this week, security researchers said today. Hundreds of thousands of pages have been hacked already.
One antivirus vendor said the sites might have been compromised through a "security issue" in Microsoft Web server software that has been reported to Microsoft Corp. engineers.
On Wednesday, several security companies, including San Diego-based Websense Inc., said large numbers of legitimate sites, including ones with URLs belong to the U.N., had been hacked and were serving up malware. Those latest compromises were only the most recent SQL injection attacks, however. Similar attacks have been launched since the first of the year and were last detected in large numbers in March.
Earlier in the week, Dan Hubbard, Websense's vice president of security research, estimated the number of hacked sites to be in the low six figures. By today, that number had soared as firms such as Panda Security pegged the number at 282,000, and F-Secure said its infected-page count was above a half-million.
Ryan Sherstobitoff, a corporate evangelist at Panda, said his company had told Microsoft about a problem with its Internet Information Services (IIS) Web server that was probably responsible for the hacks. "We reported a security issue, but I don't have any specific details on whether it's a vulnerability," Sherstobitoff said.
"It's not like this is a brand-new problem," he said, referring to compromises of legitimate sites. "But Microsoft has already issued a security advisory that said they are investigating public reports of problems with IIS. This seems to be related to that advisory."
That advisory, published April 17, warned users of a bug in most versions of Windows that could be exploited through custom Web applications running in IIS. It could also be exploited via SQL Server, Microsoft said.
On Friday, Microsoft said it did not know whether the ongoing site attacks were linked to the bug described in the April 17 advisory. "We have not yet determined whether or not these reports are related to Microsoft Security Advisory 951306 released last week," a company spokesman said in an e-mail.
Microsoft also contested Panda's claim that it had reported a problem. "Microsoft is currently aware of and is reviewing reports regarding public claims of attacks on IIS Web servers," said Bill Sisk, a communications manager who works in the Microsoft Security Response Center. "While we have not been contacted directly regarding these reports, we will continue to monitor all reports either publicly shared or responsibly disclosed and investigate once sufficient details are provided."
Although it may not be clear how attackers are compromising such large numbers of Web sites, what happens after a site is infected is well understood, researchers have said. When a visitor reaches one of the hacked sites, malicious JavaScript loads an IFrame from a malware-hosting server and the IFrame redirects the browser to a different page, also hosted on the hacker's server.
Next, a multiple-strike attack kit is downloaded to the visitor's PC. The kit tries eight different exploits, and if it finds one that works, it hijacks the system.
These kinds of attacks, said Sherstobitoff, essentially make the idea of a "trusted site" moot. "You used to know that if you walked down the dark streets of the Web, you would be infected. Today, you really can't tell what the dark streets are."
The hacker strategy, of course, is to leverage that uncertainty. "This is getting really bad," Sherstobitoff said.
Attacks on legitimate Web domains, including some belonging to the United Nations, have expanded dramatically this week, security researchers said today. Hundreds of thousands of pages have been hacked already.
One antivirus vendor said the sites might have been compromised through a "security issue" in Microsoft Web server software that has been reported to Microsoft Corp. engineers.
On Wednesday, several security companies, including San Diego-based Websense Inc., said large numbers of legitimate sites, including ones with URLs belong to the U.N., had been hacked and were serving up malware. Those latest compromises were only the most recent SQL injection attacks, however. Similar attacks have been launched since the first of the year and were last detected in large numbers in March.
Earlier in the week, Dan Hubbard, Websense's vice president of security research, estimated the number of hacked sites to be in the low six figures. By today, that number had soared as firms such as Panda Security pegged the number at 282,000, and F-Secure said its infected-page count was above a half-million.
Ryan Sherstobitoff, a corporate evangelist at Panda, said his company had told Microsoft about a problem with its Internet Information Services (IIS) Web server that was probably responsible for the hacks. "We reported a security issue, but I don't have any specific details on whether it's a vulnerability," Sherstobitoff said.
"It's not like this is a brand-new problem," he said, referring to compromises of legitimate sites. "But Microsoft has already issued a security advisory that said they are investigating public reports of problems with IIS. This seems to be related to that advisory."
That advisory, published April 17, warned users of a bug in most versions of Windows that could be exploited through custom Web applications running in IIS. It could also be exploited via SQL Server, Microsoft said.
On Friday, Microsoft said it did not know whether the ongoing site attacks were linked to the bug described in the April 17 advisory. "We have not yet determined whether or not these reports are related to Microsoft Security Advisory 951306 released last week," a company spokesman said in an e-mail.
Microsoft also contested Panda's claim that it had reported a problem. "Microsoft is currently aware of and is reviewing reports regarding public claims of attacks on IIS Web servers," said Bill Sisk, a communications manager who works in the Microsoft Security Response Center. "While we have not been contacted directly regarding these reports, we will continue to monitor all reports either publicly shared or responsibly disclosed and investigate once sufficient details are provided."
Although it may not be clear how attackers are compromising such large numbers of Web sites, what happens after a site is infected is well understood, researchers have said. When a visitor reaches one of the hacked sites, malicious JavaScript loads an IFrame from a malware-hosting server and the IFrame redirects the browser to a different page, also hosted on the hacker's server.
Next, a multiple-strike attack kit is downloaded to the visitor's PC. The kit tries eight different exploits, and if it finds one that works, it hijacks the system.
These kinds of attacks, said Sherstobitoff, essentially make the idea of a "trusted site" moot. "You used to know that if you walked down the dark streets of the Web, you would be infected. Today, you really can't tell what the dark streets are."
The hacker strategy, of course, is to leverage that uncertainty. "This is getting really bad," Sherstobitoff said.