ITBusiness.ca

How to not have your Web site hacked like Sony’s

The U.S. Sony Playstation Web site is the latest high-profile victim of a hacker attack on business sites that’s spreading malware at breakneck pace, says a security vendor.

Sophos PLC reported that Sony had suffered an SQL injection attack Wednesday. Malicious code was planted on pages of two popular Playstation games – SingStar Pop and God of War.

The digital security company alerted Sony to the problem, and it was fixed as of early Thursday morning, says Graham Cluley, senior technology consultant with Sophos headquartered in Abingdon, U.K.

While the Playstation site is now clean, hundreds of other Web sites have been compromised by the same attack, he says. Affected sites are wide ranging, says Cluley, “from Brazilian and Chinese government sites to a garden pond supplier in Canada.”

The SQL injection attack is an old hacker trick that has found new life.

Its usage in recent months has soared, as cyber criminals use automated programs to scour the Web for pages and sites vulnerable to such exploits.

The attacks have transformed thousands of credible business Web pages on sites such as MSNBC into malware-peddling portals.

Attacks have ballooned in recent months. There is now a new malware-infected Web page every five seconds, according to Sophos. That’s three times the rate of infection compared to last year. Eight out of 10 Web sites suffering from the attack are legitimate business Web sites.

“There’s been a spate of attacks being called by a botnet named Asprox,” Cluley says. “It’s using innocent people’s computers to go on the Web and find vulnerable targets.”

An automated attack is to blame for the Sony hack, he adds. It wasn’t launched by a person, but an automated program that stumbled upon the code vulnerability on the Playstation pages and took advantage.

A screenshot of one of the affected Sony pages, courtesy of Sophos.

The attacks don’t exploit a specific software vulnerability, but take advantage of poor coding practices, according to a Microsoft Security Advisory. Companies that access and manipulate data in a relational database such as SQL Server from a Web site are at risk.

It comes down to a problem with a Web application, says Brian Bourne, president of Toronto-based security analyst firm CMS Consulting Inc. Developers are failing to do proper code checking to prevent the attacks.

“They’re not doing input validation,” he explains. “They’re not looking at it and saying ‘hey, this is not regular user input’ – that’s the simple version.”

But Web administrators have to shoulder the burden of blame too, Bourne adds. They’re responsible for creating a layered security approach to protect against known and yet-to-be-discovered exploits.

The fake scan that surfers saw when exposed to the hack, graphic courtesy of Sophos.

The most common variety of the hack is a direct insertion of code into a place where a user inputs information. That gives hackers an opportunity to inject SQL commands that are executed blindly by the server.

Video game fans surfing on the Playstation Web site were subjected to a pop-up window that displayed a fake virus scan running, followed by a message their computer was ridden with viruses and Trojans. Then the surfer is offered a fake anti-virus software package for a fee.

Hackers could alter the malicious payload to be even worse, according to Sophos. The attacks are often used to collect personal information in identity theft scams, or to recruit more computers onto a botnet.

SQL injection is an “extremely effective” method of attack that can be easily hidden in the nooks and crannies of Web code, Cluley says. The problem lies with a lack of rigorous checking of code by the administrators affected.

“If they’re not doing proper checking, hackers can start to embed and inject code into their database,” the consultant explains. “[The database] ends up peppered with small pieces of code calling up third-party Web sites.”

Such attacks have become so pervasive that Microsoft responded to the SQL Server user community last week with two free tools and a security advisory to help Web admins safeguard against SQL injection.

Here are the tools and tips passed on by Microsoft and Bourne:

 

 

 

Fixing the actual root of the problem is important, Cluley says. A Web site that simply removes the injected code but doesn’t patch up the exploit will find the code is re-inserted in short order by automated botnets.

It’s not clear what steps Sony has taken with their Web site at this time. “We haven’t heard directly back from their Web team,” the Sophos consultant says.

ITBusiness.ca attempted to contact Sony, but did not receive a response.  

Exit mobile version