funsec mailing list archives
Websense: A Tale of Two ANI Attacks
From: "Fergie" <fergdawg () netzero net>
Date: Mon, 9 Apr 2007 18:18:38 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Well worth a read. Via The Websense Security Labs Blog. [snip] By now most of you are familiar with the ANI zero-day attacks that have been happening over the last week. See bottom of this blog entry for URL details and background on ANI. The state as of now is that there are more than 2000 unique sites that are hosting exploit code and/or are compromised and are pointing to machines that host exploit code. There are two main attacks that comprise of the majority of these sites. The first set we believe are one of the first groups to start using the zero-day exploits in the wild. These are attacks that started in the China region and appear to be created by groups within the Asia Pacific Region. The attackers have compromised hundreds of machines and placed IFRAME's back to the main servers that host the exploit code. In most cases the payload and motivation of these attacks is to gather credentials for online games such as lineage. Lineage is a very popular online game in Asia. The second set of attacks started just a couple days ago appear to be from a group in Eastern Europe. This group has been placing exploit code on sites for many years now and has a very resilient infrastructure. They have used WMF, VML, and several other exploits in there routines previously. As of now they have also added the ANI attacks to their arsenal. The payload and motivation is somewhat different however as they are more known to install rootkit's and crimeware which is designed to install form grabbing software and keyloggers in order to compromise end-user banking details. Also in the past they have installed fake anti-spyware software as a distraction and as a means to falsify someone into acquiring some anti-spyware software. [snip] More: http://www.websense.com/securitylabs/blog/blog.php?BlogID=122 - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.0 (Build 214) wj8DBQFGGoN0q1pz9mNUZTMRAkadAJ9yNLnz5x5bw3MfN17Hn6GbfZe5MwCgp2F2 N42r049WOJikrJ20a0nOKJU= =r7YX -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Websense: A Tale of Two ANI Attacks Fergie (Apr 09)