FYI...
mysql.com hacked - malware served to visitors...
-
http://blog.armorize...itors-with.html
9.26.2011 - "Our HackAlert 24x7 Website malware monitoring platform today indicated that
mysql.com has been hacked...
Step 1: http ://www .mysql .com
Causes the visiting browser to load the following:
Step 2: http ://mysql .com /common/js/s_code_remote.js?ver=20091011...
Step 3: http ://falosfax .in/info/in.cgi?5&ab_iframe=1&ab_badtraffic=1&antibot_hash=1255098964&ur=1&HTTP_REFERER=http ://mysql .com/
Throws out a 302 redirect to Step 4.
Step 4: http ://truruhfhqnviaosdpruejeslsuy .cx.cc/main.php
This domain
hosts the BlackHole exploit pack. It exploits the visitor's browsing platform (the browser, the browser plugins like Adobe Flash, Adobe PDF, etc, Java, ...), and upon successful exploitation, permanently installs a piece of malware into the visitor's machine, without the visitor's knowledge. The visitor doesn't need to click or agree to anything;
simply visiting mysql .com with a vulnerable browsing platform will result in an infection.
Currently,
9 out of 44 vendors on VirusTotal* can detect this piece of malware."
(More detail at the armorize URL above.)
**
http://www.virustota...90a1-1317040603
File name:
w.php
Submission date: 2011-09-26 20:23:24 (UTC)
Result:
9/44 (20.5%)
There is a more up-to-date report ...
-
https://www.virustot...90a1-1317260745
File name:
e1d511259779f6a02f2a61cfedc2551ec70885b6.bin
Submission date: 2011-
09-29 01:45:45 (UTC)
Result:
28/43 (65.1%)
___
-
https://krebsonsecur...serves-malware/
Monday, September 26th, 2011 at 3:52 pm - "... it appears the malicious scripts were injected into the site sometime within the last seven hours. If that’s accurate, that was enough time for approximately 120,000 Internet users to browse the site and expose their systems to the exploit kit..."
>
http://www.alexa.com...m...me&p=bigtop
-
https://www.computer...o_serve_malware
September 26, 2011 03:19 PM ET - "... Armorize noticed the problem at around 5 a.m. Pacific Time Monday. Hackers had installed JavaScript code that threw a variety of known browser attacks at visitors to the site, so
those with out-of-date browsers or unpatched versions of Adobe Flash, Reader or Java on their Windows PCs could have been quietly infected with malicious software. By just after 11 a.m., the issue had been cleaned up, said Wayne Huang, Armorize's CEO..."
___
-
https://isc.sans.edu...l?storyid=11638
Last Updated: 2011-09-26 21:50:32 UTC – “… now been cleaned up on mysql .com but no further words on the scope of the compromise. It also appears to be the second time this year*. In the last incident, SQL injection was used to gain access to the information on the site.”
*
https://www.scmagazi...article/199419/
March 28, 2011
Edited by AplusWebMaster, 29 September 2011 - 06:30 AM.