Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Major online ad site hacked, serving up exploit cocktail

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Mr. Sparkle Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-10-09 10:44 PM
Original message
Major online ad site hacked, serving up exploit cocktail
Source: Zdnet.com

A high-profile online advertising Web site has been hacked and rigged to serve multiple exploits to Microsoft Windows users surfing the net with unpatched third party desktop software.

According to a warning issued by Websense Security Labs, the malicious code was found on media-servers.net, which is described as a high-profile advertiser on the Internet realm. The site has been firing an assortment of exploits for several months, including exploits for vulnerabilities in Microsoft DirectShow and Adobe PDF Reader.

Here’s a list of the exploits associated with this attack:

* Microsoft DirectShow (CVE-2008-0015)
* Microsoft Snapshot Viewer (CVE-2008-2463)
* Microsoft Data Access Components (MDAC) CVE-2006-0003
* AOL ConvertFile() remote buffer overflow exploit

Websense said the rigged site also comes with an auto-loading malicious PDF file that attempts to exploit these vulnerabilities:

* Adobe Reader and Acrobat 8.1.1 buffer overflow (CVE-2007-5659)
* Adobe Acrobat and Reader 8.1.2 buffer overflow (CVE-2008-2992)

If the user’s browser is successfully exploited, Websense says a malicious file is downloaded and run in the user’s Windows home directory from another collaborated exploit site.

The company’s blog has screenshots of the attack site.

Read more: http://blogs.zdnet.com/security/?p=4885&tag=content;col1
Printer Friendly | Permalink |  | Top
PSPS Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-10-09 10:57 PM
Response to Original message
1. We've been getting a lot of calls because of this
These maliciously coded ads get sent out to a lot of legitimate sites that subscribe to ad syndicators and exploit an unpatched system's vulnerability to install all kinds of rogue crap. It's not too hard to clean up, but sometimes you'll get a rootkit. The most popular exploit seems to be an infected PDF within an iframe which can use Adobe Reader below version 9 to infect a machine regardless of browser.
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 03:43 AM
Response to Reply #1
9. I got one from fark.com at work a few weeks ago.
And because I was at work I couldn't do anything but write an email to IT and hope they fixed it before it hijacked outlook or worse. It had already started putting porn links on my desktop and wouldn't let me run spybot.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-10-09 11:29 PM
Response to Original message
2. CVE's from 2006, 2007, and 2008?
People who go for years without patching/updating, well, it's hard for me to have much sympathy.
Printer Friendly | Permalink |  | Top
 
frylock Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 12:46 AM
Response to Reply #2
3. yep..
but the haters will pile on, nonetheless.
Printer Friendly | Permalink |  | Top
 
JoeyT Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 01:46 AM
Response to Reply #2
4. I used to say that a lot too.
But then I was in the business of fixing computers for a while, and it kinda toned that down a bit for me. Most of the people that get damaged by stuff like this are older people that don't know a whole heckuva lot about computers because they didn't grow up with them.
Companies that have unpatched machines get no sympathy from me, but people that just aren't terribly computer literate do.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 02:16 AM
Response to Reply #4
5. I come at it from the other angle.
I was once on a team where our job was to find network detection solutions (with resulting threat mitigation) on CVE's within 24 hours of their public release... we used to also work off of frsirt (now vupen) tickets, because they were often a few days ahead of the US.

Fun work, but somewhat stressful, as you can probably imagine who the client list was, and how important security was to them. :D

A week I can see. A month, maybe. But a year? Even with patch Tuesday?

Are these mostly folks running bootleg windows copies, so they can't update? Dial-up folks who don't want to sacrifice bandwidth?
Printer Friendly | Permalink |  | Top
 
JoeyT Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 02:26 AM
Response to Reply #5
6. The latter of those two for my people.
Edited on Wed Nov-11-09 02:27 AM by JoeyT
Rural Alabama. I'd say broadband in the surrounding 100 miles covers about 30% or so of it.
First time they see something like "Your Windows Update will complete in 82 days." is the last time they update anything. ;)
Printer Friendly | Permalink |  | Top
 
clear eye Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 02:48 AM
Response to Original message
7. Some shitheads exploited my Outlook Express.
Now I have to run it w/ the automatically view message feature disabled, even though my ISP uses an effective spam-blocker (I get no visible spam, ever), and my security suite checks incoming email. If I leave OE open while I'm using the Internet, sooner or later something runs that scrambles the keyboard when I try to type something. Hasn't happened since I both blocked the automatic view and stopped leaving OE open while I'm online. This happened though I upgraded to Adobe 9 shortly after it became available, as well as have Windows on automatic update.

Let's put the blame for the issue in the OP where it belongs, which is not on the users. Why is a very profitable online ad business not made secure enough to exclude malware like the other big ad providers do? They deserve to lose their business over this.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-11-09 03:01 AM
Response to Reply #7
8. Oh, that class of crap... (OE view bugs)
OE was written based on a bunch of libraries with truck-sized holes in them.

Typical bug: Look at the wrong image in your emails = get infected.

Taking the blame away from the users, why is a simple mail client... (something that's been around since the 60's....) letting users get infected?

Sure, those who get infected by a Typhoid Mary can point blame at Mary, but the blame also belongs with software that has no effective handling of disease, no immune system, and goes out of it's way to *create* new ways of being infected.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed Apr 24th 2024, 06:33 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC