FYI...
-
http://preview.tinyurl.com/rbxxwa
May 14, 2009 PC World - "
A new round of website hijacks is attempting to install malicious, Google-focused software on unpatched PCs, according to security company ScanSafe, further cementing the drive-by-download approach as a bad-guy tactic of choice. The attack, dubbed "
Gumblar" by ScanSafe*, starts by hijacking legitimate sites and inserting attack code. The more than 1,500 hacked sites, including Tennis.com and Variety.com, don't represent an especially huge number, but it's growing rapidly. Since last week, the attack has grown by 80 percent, according to the company, and has spiked 188 percent since yesterday.
The inserted attack code attempts to identify old, unpatched vulnerabilities on a victim PC that browses a hacked site, and
will take advantage of any discovered hole to install malware. These kinds of drive-by-download attacks are sneaky and dangerous, but the good news is that while the actual exploits used vary as time passes, the company says none have yet gone after zero-day holes that don't yet have a fix available. The attack code has largely gone after PDF and Flash flaws discovered in the last year..."
*
http://blog.scansafe...gumblar-qa.html
-
http://www.theregist..._web_infection/
14 May 2009 - "... The exploit code is unique for every website, making it impossible to identify a compromised site until someone has accidentally surfed there.
It uses obfuscated Javascript that's burrowed deep into a website's source code
to exploit unpatched vulnerabilities in a visitor's Adobe Flash and Reader programs. Victims then join a botnet that manipulates their Google search results... By injecting ads and links into certain searches, infected users see results that are different than they would otherwise be..."
-
http://www.darkreadi...cleID=217500218
May 14, 2009 - "... difficult to find and bring down... its source IP addresses have been traced to Latvia and Russia, and its servers are located in the U.K..."
Gumblar .cn exploit
-
http://preview.tinyurl.com/r5cplm
07 May 09 (Unmask Parasites blog)
More Facts about the Gumblar attack
-
http://preview.tinyurl.com/qg5c8d
15 May 09 (Unmask Parasites blog)
Troj/JSRedir-R attacks
-
http://www.sophos.co...abs/v/post/4422
May 14, 2009
• http://google.com/sa...ite=gumblar.cn/
"... Malicious software includes 24 scripting exploit(s), 6 trojan(s)... site has hosted malicious software over the past 90 days. It infected 12799 domain(s)..."
Edited by AplusWebMaster, 18 May 2009 - 07:49 AM.
Added Dark Reading and Google diag link...