Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Those behind the SQL injection attack that compromised pages belonging to the Wall Street Journal and a number of other sites are at it again, according to researches at malware detection solutions provider Sucuri Security.
The latest wave of attacks began on Friday morning and, at that time, 1,000 pages, including the websites for Chicago Public Radio and IndustryWeek, were infected, David Dede, lead security researcher at Sucuri Security, told SCMagazineUS.com on Friday.
“They [attackers] just started using a different site to host the malware, which is still live, so these sites are currently actively serving malware to their users,” Dede said.
Some of the same sites that were infected earlier this week were reinfected in the latest attack, he added. Since the second round of the attack just began, it is difficult to determine the extent, so the actual number of infected sites might be greater than 1,000.
The attack also has affected the websites: Ameristar.com; Servicewomen.org, which was also infected in the last wave of attacks, Booksellerandpublisher.com.au and Spain-holiday.com.
Ironically, one of the infected sites was Idera.com, a provider of SQL Server and SharePoint administration tools, Dede said.
Just like the last wave of attacks, all affected sites are hosted on Microsoft Internet Information Services (IIS) web servers, and using Active Server Pages software from ASP.net.
Earlier this week, Microsoft said the previous attack was the result of vulnerabilities in third-party web applications and did not demonstrate holes in Microsoft software.
Mary Landesman, a senior security researcher at Cisco, has said SQL injection attacks like this are common.See original article on scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.