Online advertisers attacked by hackers

A hacking scheme designed to use online ads to send out Trojans has affected at least 10,000 Web sites, according to an executive with Finjan Inc.

It appears that a single gang is behind the attacks, since the malicious software it spreads is storing login and password details on one server in Spain, said Yuval Ben-Itzhak, chief technology officer if San Jose, Calif.-based Finjan. The vendor is trying to get the Internet service provider to shut it down, he said.

A Web server of an online advertising company that serves 14 million banner ads to other Web sites has also been hacked, Ben-Itzhak said. That means that the PC of anyone who visits a legitimate site hosting a malicious banner ad could potentially be infected if their computer isn’t patched, he said. “You can imagine the magnitude,” Ben-Itzhak said.

Ben-Itzhak declined to identify the company, but said Finjan contacted it last week about the problem. At least 10,000 other Web sites were serving up malicious code in December, although Finjan stopped counting, Ben-Itzhak said.

The latest problems show that the power of this particular hacking gang appears to be growing since it was identified early last year. At that time, Finjan said it found a number of Web servers that had been hacked in order to serve malicious code to visitors. The attackers used several methods to hide their tracks and infect a maximum number of PCs.

The attack is structured using JavaScript so that the malicious code is only served up once to a PC, which helps avoid repeated tests by security scanning services.

Further, hackers also record the IP (Internet Protocol) addresses of crawlers used by search engines and reputation services, which evaluate the risk in visiting certain Web sites. Those page requests are then served with legitimate content.

The JavaScript that starts the exploit also dynamically changes, which makes it more difficult to detect with security software, Finjan said. Once hacked, a Web server hosting hundreds of Web sites will serve up the attack code.

The code looks for at least 13 software vulnerabilities in order to place a Trojan horse program on the PC.

The hackers also regularly change the vulnerabilities that the attack looks for in order to increase the chances a computer can become infected, Ben-Itzhak said. After the PC is infected, the malware can start collecting data on the machine, such as documents and passwords. Finjan has dubbed the attack “random js Trojan.”

Finjan asserts that antivirus software isn’t as effective since the attack code can change so frequently. The company has a browser plug-in, called SecureBrowsing, that analyzes the content of a Web page as it’s being served, looking for traces of malicious code and then warning users. It also sells an enterprise-level appliance with scanning technology.

Finjan isn’t the only company with that kind of technology. Exploit Prevention Labs, which was recently acquired by security company AVG, also has a product called LinkScanner that analyzes Web page content for malware, and McAfee has a service called SiteAdvisor that ranks the health of a Web site. All three companies offer free versions of their products.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now