Malicious code embedded in about two dozen MySpace pages downloads the dangerous FluxBot onto victims' machines.
Internet Storm Center researchers are warning users that drive-by exploits have been embedded in a few dozen legitimate MySpace pages.
Johannes Ullrich, chief technology officer with the Internet Storm Center, told InformationWeek that the malicious code that's embedded in the Web pages installs the FluxBot, a dangerous new bot. Since the bot doesn't have a central command and instead relies on a complex set of ever-changing networks of proxy servers, Ullrich said it's extremely difficult to shut it down or cleanse it off an infected system.
"It appears that these are compromised accounts," said Ullrich. "Hackers overtook maybe a few dozen pages. MySpace is fixing the issue. ... They reacted very quickly in this case."
Ullrich explained that the embedded malicious code tries to exploit an old Microsoft Internet Explorer bug that was patched mid-2006. If that bug lets in the exploit, then the FluxBot is downloaded.
"The IE hole is not particularly dangerous at this point, but quite a few people still got hit," he added. "I guess there are a lot of people out there with unpatched versions of Internet Explorer."
Ullrich also noted that while MySpace isn't a new target for hackers, it's an increasingly popular one.
While he said MySpace as a company runs a tight security ship, the site's phenomenal popularity is built on the fact that users are able to create their own pages. That means that honest people may create pages that hackers can easily take advantage of, but it also means that cybercriminals can pose as everyday users and build their own malicious pages to trap other MySpace users.
This past February, two men pleaded no contest to charges stemming from their scheme to write malicious code and use it to extort $150,000 from MySpace. Shaun Harrison and Saverio F Mondelli, both of New York, pleaded to the single charge of unauthorized computer access. Three other charges, including attempted extortion and another unauthorized access charge, were dropped, according to Jeffrey McGrath, deputy district attorney for Los Angeles County.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.