ITBusiness.ca

Security vendor Trend Micro victim of massive Web attack

Security vendor Trend Micro has fallen victim to a widespread Web attack that splashed malicious software onto hundreds of legitimate Web sites in recent days.
A Trend Micro spokesman confirmed that the company’s site had been hacked Thursday, saying that the attack took place earlier in the week.

“A portion of our site — some pages were attacked,” said Mike Sweeny, a Trend Micro spokesman. “We took the pages down overnight Tuesday night — and took corrective action.”

On Thursday security vendor McAfee reported that more than 20,000 Web pages have been affected by the attack. The pages are infected with malicious code that tries to install password-stealing software on the PCs of people who visit the sites.

Security rival Sophos added more details late Thursday in a post to its blog. There, Graham Cluley, a Sophos senior security consultant, claimed that the hack had been an SQL injection attack and included a link to an alert Trend placed on its Japanese-language site that identified the malware as JS_DLOADER.TZE.

The alert also said that users could have been infected by accessing one of 11 infected pages on the Japanese site or 20 pages on the English site, or by clicking a link embedded in the malware’s name. All the pages were part of Trend Micro’s malware encyclopedia, a searchable database of viruses, Trojans and worms.

Researchers are still not sure how the attackers are managing to hack these Web pages, but the pages all seem to use Microsoft’s Active Server Page (ASP) technology, which is used by many Web development programs to create dynamic HTML pages.

A software bug in any of those programs is all the attackers need to install their malicious code.

The infected Web pages are not obviously malicious, but the attackers have added a small bit of JavaScript code that redirects visitors’ browsers to an invisible attack launched from servers based in China.

“When users viewed any of the modified pages, they were reconnected to other sites without realizing it, and a type of virus was installed on their computer that causes them to download other viruses in a series,” said the Yomiuri Shimbun, one of Japan’s largest newspaper. The paper also reported the attack Malware was JS_DLOADER.TZE and it occured at 7 p.m. ET last Saturday.

This same technique was used a year ago, when attackers infected the Web sites of the Miami Dolphins and Dolphins Stadium just prior to the 2007 Super Bowl XLI football game.

The JavaScript attack code hosted on these infected Web sites takes advantage of bugs that have already been patched, so users whose software is up-to-date are not at risk. However, McAfee warns that some of the exploits are for obscure programs such as ActiveX controls for online games, which users may not think to patch.

If the code is successful, it then installs a password-stealing program on the victim’s computer that looks for passwords for a number of online games, including the “Lord of the Rings Online.”

Sweeny, Trend’s U.S. spokesman said “about 32” pages were involved, “most of them from the encyclopedia.”

It’s embarrassing when security vendors fall victim to the attacks they are supposed to prevent, but Trend Micro is not the only company to have had its Web site hacked in recent months.

In January, parts of CA’s Web site were infected with a very similar type of attack.

— With files from Gregg Keizer

Exit mobile version