Another site hacked...

Discussion in 'other security issues & news' started by 19monty64, Nov 9, 2007.

Thread Status:
Not open for further replies.
  1. deanmartin

    deanmartin Registered Member

    Joined:
    Sep 6, 2007
    Posts:
    232
    Location:
    USA/KY
    Sorry, couldn't pass that one up.
     
  2. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country
    So I guess the answer is no to the first question and at least possibly to the second ?
     
  3. ccsito

    ccsito Registered Member

    Joined:
    Jul 27, 2006
    Posts:
    1,579
    Location:
    Nation's Capital
    I wonder why they used this name? Are they supposed to come apart? ;)
     
  4. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    From a post by lusher back in August:

    http://forums.anandtech.com/messageview.aspx?catid=76&threadid=2088998&enterthread=y
    In the same forum above, mechBgon identifies the malware to include Storm worm.

    This is a simple drive-by exploit using iframe. Anyone with basic execution protection was protected, if the exploit indeed was able to get by the browser.

    With Deep Freeze, anything installed on a Frozen Partition is removed on a re-boot.

    Those 'black hats' look for vulnerabilities in servers. I doubt they are particular about what kind of site is is. Remember the Dolphins Super Bowl incident, for example. It used an iframe to trigger the exploit. Another similar exploit that comes to mind was the Support Page of BellSouth.com

    From other Avast forum posts:

    http://forum.avast.com/index.php?topic=30120.0
    http://forum.avast.com/index.php?topic=30118.0

    ----
    rich
     
  5. LUSHER

    LUSHER Registered Member

    Joined:
    Feb 28, 2007
    Posts:
    440
    Sure I have. I invented them.
     
  6. 19monty64

    19monty64 Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    1,302
    Location:
    Nunya, BZ
  7. 19monty64

    19monty64 Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    1,302
    Location:
    Nunya, BZ
  8. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Standard procedure for popups is to close the window with CTRL+ F4, or click on the X at the top of the window

    Hopefully, no one who frequents Wilders is vulnerable to this type of remote code execution (aka 'drive-by download').


    ----
    rich
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.