Hundreds of Thousands of Microsoft Web Servers Hacked

Status
Not open for further replies.

Cyrus_the_virus

Unmountable Boot Volume
Hundreds of thousands of Web sites - including several at the United Nations and in the U.K. government -- have been hacked recently and seeded with code that tries to exploit security flaws in Microsoft Windows to install malicious software on visitors' machines.
The attackers appear to be breaking into the sites with the help of a security vulnerability in Microsoft's Internet Information Services (IIS) Web servers. In an alert issued last week, Microsoft said it was investigating reports of an unpatched flaw in IIS servers, but at the time it noted that it wasn't aware of anyone trying to exploit that particular weakness.

On Thursday, Spanish anti-virus vendor Panda Security said that it had alerted Microsoft that a flaw IIS was the cause of all the break-ins. When I asked Microsoft whether they'd heard from Panda or if the hundreds of thousands of sites were hacked from a patched or unpatched flaw in IIS, a spokesman for the company didn't offer much more information.

"Microsoft is currently aware of and is receiving reports regarding public claims of attacks on IIS Web servers," said Bill Sisk, a security response manager at Microsoft, in a statement e-mailed to Security Fix. "While we have not be [sic] contacted directly regarding these reports, we will continue to monitor all reports either publically [sic] shared or responsibly disclosed and investigate once sufficient details are provided. We have not yet determined whether or not these reports are related to Microsoft Security Advisory (951306) released last week."

According to Finnish anti-virus maker F-Secure, the number of hacked Web pages serving up malicious software from this attack may be closer to half a million.

Dancho Danchev, an independent security analyst, has a decent write-up on signs that Web site owners can look for to tell whether their site has been hit by this attack. Danchev said all of the hacked sites appear to have Javascript coding adding to their page source that silently pulls down malware from a few domains in China, namely nihaorr1.com, and haoliuliang.net.

Needless to say, if you run a Google search for these sites you will find tens of thousands that contain the script that redirects any visitors to these malicious sites. I would strongly urge people to steer clear of those sites: I mention them here so that Web site owners can more easily search the HTML code in their pages for these domains.

There are indications that this attack is coming in waves, with the bad guys swapping in new malicious downloader sites every few days. According to posts on an IIS user forum, Web site administrators first saw signs of this attack on April 17, the day before Microsoft issued its initial advisory on the IIS vulnerability.

If you run your site with IIS, please take a moment to consider applying the workarounds in the Microsoft advisory for your version of IIS. Also, that IIS.net post I mentioned earlier has some great tips to help administrators lock down their systems.

These types of attacks that infiltrate legitimate, trusted Web sites are precisely the reason I so often recommend Firefox over Internet Explorer. There is a great add-on for Firefox called "noscript," which blocks these kinds of Javascript exploits from running automatically if a user happens to visit a hacked site. Currently, there is no such protection for IE users, and disallowing Javascript entirely isn't really an option on today's World Wide Web. True, you can fiddle with multiple settings in IE to add certain sites to your "Trusted Zone," but that option has never struck me as very practical or scalable.

Source: Washington post


Security expert: Don't blame Microsoft for mass site defacements :lol:

Progress was made Monday in mitigating thousands of SQL-based Web sites injected with malicious Javascript code. However, one security expert says we can expect more such attacks in the near future.

A traditional SQL injection attack allows malicious attackers to execute commands on an application's database by injecting executable code. "What's different about this latest attack is the size and the level of sophistication," said Jeremiah Grossman, CTO of White Hat Security.

*i.i.com.com/cnwk.1d/i/bto/20080428/nihaorrattack_270x279.jpg
On Monday, CNET found a few sites still infected with the latest SQL-injection attack.

In the past, attackers have gone after a small niche of the Internet--say travel sites or sports sites--but with this latest attack, attackers have a generic way to blast the Internet, and they've chosen to attack sites running MS-SQL.

On Friday, Microsoft denied that new vulnerabilities within Internet Information Services are to blame for a rash of Web site defacements. Microsoft insists it's the application developer's responsibility to follow the company's best practices. These include constraining and sanitizing input data, using type-safe SQL parameters for data access, and restricting account permissions in the database.

Grossman agreed it's not Microsoft's fault, :lol: and said the attacks could have easily targeted another vendor's software. If users surf to an SQL-injected site, their browser will attempt to download a variety of exploits, not all of which are Microsoft-based. One site from the Shadowserver Foundation lists exploits affecting Real and other vendors alongside various Microsoft Security bulletins.

Grossman said that just turning off Javascript won't necessarily protect end users from this latest round of attacks since the attackers can use traditional HTML as well.

"It's said that the attacks never get worse, they only get better," Grossman said. But in terms of the good guys closing the gap with the attackers, he remains optimistic. He said with more diligence and more care, we can protect Web sites from these attacks.

Source: CNet
 

JGuru

Wise Old Owl
It's business as usual as far as Hackers are concerned!!!!
Use Ubuntu Server Edition with Apache Web Server. It's hack-proof.
No ports are open. Fully secure Linux O.S.
 

praka123

left this forum longback
bad reports reg M$haft is sure a headache for window$ users.
Use Linux!move fast!
Debian - *debian.org -one of the most secure OS.good for server systems.
Ubuntu wont come near Debian Etch when reg,security :)
 

kumarmohit

Technomancer
sad indeed but unless more details emerge and MS is actually held responsible, I think we should go on easy with criticism. Unless we know that it is the road maker's fault, this is like blaming the contractor for losses caused by jaywalkers not following traffic laws and walking on footpath!

If it is actually MS's fault which I strongly suspect is going to be the case, consider the above statement nullified and count me into bashing the company!;)

@ Praka
Again bro, easy on the links. It makes reading your replies hurt my head and eyes. Too much blue text. Please I humbly state that this forum is not a place to play SEO and improve their page rank!
 
I donno the details but if the cause is only sql injection, then no company can be held responsible. Its the responsibility of developers to take measures available to them to strenthen security and i think every book that i have read on database systems and data access technologies talks about these issues, specially SQL Injection.
 

iMav

The Devil's Advocate
^^ are in any way trying to say that there is a chance that MS's OS are not to be blamed:? if so then there is no point ;)

you are *www.thinkantiMS.com/forum :)
 

hellknight

BSD init pwns System V
Switch to Red Hat Server, Ubuntu Server or Suse Linux Enterprise Server. Make your website secure.
 
OP
Cyrus_the_virus

Cyrus_the_virus

Unmountable Boot Volume
I donno the details but if the cause is only sql injection, then no company can be held responsible. Its the responsibility of developers to take measures available to them to strenthen security and i think every book that i have read on database systems and data access technologies talks about these issues, specially SQL Injection.

^^ are in any way trying to say that there is a chance that MS's OS are not to be blamed:? if so then there is no point ;)

Cyrus_the_Virus said:
The attackers appear to be breaking into the sites with the help of a security vulnerability in Microsoft's Internet Information Services (IIS) Web servers. In an alert issued last week, Microsoft said it was investigating reports of an unpatched flaw in IIS servers, but at the time it noted that it wasn't aware of anyone trying to exploit that particular weakness.

On Thursday, Spanish anti-virus vendor Panda Security said that it had alerted Microsoft that a flaw IIS was the cause of all the break-ins. When I asked Microsoft whether they'd heard from Panda or if the hundreds of thousands of sites were hacked from a patched or unpatched flaw in IIS, a spokesman for the company didn't offer much more information.

"Microsoft is currently aware of and is receiving reports regarding public claims of attacks on IIS Web servers,"

I wonder which company is to blame for not patching a flaw in MICROSOFT Internet Information Services (IIS) :rolleyes::rolleyes: :lol:
 
Status
Not open for further replies.
Top Bottom