New Attack Uses Bogus Web Sites To Deliver Malware - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

New Attack Uses Bogus Web Sites To Deliver Malware

The new threat comes from a number of newly registered Web sites that pretend to represent Italian organizations, but are really just vehicles for using malicious IFrames to spread malware.

The Italian job that last month saw more than 10,000 legit Web pages embedded with malicious IFrames has resurfaced, this time with even more international intrigue. Last month's threat pushed malicious HTML files onto Web pages of several Italian Web sites and infected Web surfers visiting those sites. The new threat comes from a number of newly registered Web sites that pretend to represent Italian organizations, but are really just vehicles for using malicious IFrames to spread malware.

Indeed, these new sites aren't even being hosted in Italy; they're being hosted out of Germany and may be tied to Russian malware writers, Trend Micro network architect Paul Ferguson told InformationWeek. "One of our researchers found an IP address that included 400 pieces of malware on different URLs," he said.

As of Friday morning, about 2,500 systems may have been infected by these malicious IFrames. "Not an astounding number," Ferguson acknowledged, "but the number is apparently growing." Trend Micro's investigation is ongoing.

An IFrame, or inline frame, makes it possible to embed one HTML document inside another HTML document. Victims of the first attack in June were people visiting Web sites hosted in Italy for Italian city councils, employment services, and tourism sites. Attackers embedded IFrames into these sites. When site visitors clicked on these malicious IFrames their computers were infected.

Trend Micro came across the new Web sites while the company's researchers were doing their daily analysis of their honeypot and proxy logs, which are placed out on the Internet and made to look like open proxies or unpatched systems ripe for attack. "We saw certain IP addresses and domain names that raised a red flag," Ferguson said. This included the movement of domains from one domain name server to another, a move that's typically associated with an attempt to avoid detection. These new sites containing malicious IFrames create layers of obfuscation that make it difficult to determine who's behind the sites.

While Trend Micro's research isn't comprehensive enough at this time to send law enforcement busting through anyone's door, it's detection of these new sites laden with malicious IFrames comes before the problem "managed to fully blossom," Ferguson said. "We're making these guys go through a lot of trouble for nothing."

It's not so much that the malware threat is different; it's similar to the one that surfaced last month in that it looks to exploit unpatched PCs. Instead, this new scheme represents an evolution of the delivery mechanism for malware. To counter these emerging methods, security vendors need to rely less on building up already bulky blacklists or adding signatures to malware filters. As cybercriminals become more experimental, it's the ability to trace these malicious sites back to their source that's going to make the difference in fighting cyber attacks, Ferguson said.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
Register for InformationWeek Newsletters
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll