US Treasury websites compromised
- http://community.web...ompromised.aspx
4 May 2010 - "A few of the US Treasury websites were compromised today and loaded a hidden iframe containing exploit code to anyone who visited the following three sites:
* bep .gov
* bep.treas .gov
* moneyfactory .gov ...
This iframe loads a page from gr[REMOVED]ad .com (hosted in Turkey) which in turn redirects to si[REMOVED]e-g .com/jobs/ (hosted in The Netherlands) which is where the exploits are hosted. In this case it's the Eleonore Exploit Kit that is used which has support for several vulnerabilities in Adobe Reader, Flash, Internet Explorer etc... the exploit kit pushes a malicious PDF to the user which exploits a vulnerability in Adobe Reader. At the time of writing only 20% of all AV vendors detected that file*..."
(Screenshots and video available at the Websense URL above.)
* http://www.virustota...1e63-1272930681
File mal.pdf received on 2010.05.03 23:51:21 (UTC)
Result: 8/40 (20.00%)
U.S. Treasury Site Compromise linked to NetworkSolutions Mass WordPress Blogs Compromise
- http://ddanchev.blog...-linked-to.html
May 04, 2010
- http://thompson.blog...ite-hacked.html
May 03, 2010
- http://pandalabs.pan...ng-exploit-kit/
05/4/10
- http://forums.whatth...=...st&p=651366
May 5, 2010
Edited by AplusWebMaster, 05 May 2010 - 09:59 PM.