Major security sites hit by cross-site scripting bugs
Thirty XSS vulnerabilities spotted on McAfee, Symantec and VeriSign sites
TechWorld.com - The Web sites of three of the security industry's best-known companies include security flaws that could be used to launch scams against customers, according to a new report.
The report, from security watchdog site XSSed, verified 30 cross-site scripting (XSS) vulnerabilities across the sites of McAfee, Symantec and VeriSign. The flaws could be used to launch scams or implant malicious code on the systems of visiting users, according to XSSed.
Recent research has shown that attackers are increasingly -- even predominantly -- now using legitimate sites to host their malware, a tactic that makes the malware distribution sites more difficult to shut down.
XSSed said its results show that even major security firms are not exempt from the problem.
In January, XSSed found that 60 Web sites that had received a "Hacker Safe" certification from McAfee Inc.'s ScanAlert service were in fact vulnerable to XSS attacks.
McAfee and other major security firms have downplayed the seriousness of XSS flaws, compared with, for instance, vulnerabilities that allow an attacker direct access to customer data stored on a server.
In recent months, the real-world exploitation of XSS flaws has boomed, exploiting major Web sites such as MySpace.com, PayPal and a major Italian bank.
Last week, ScanSafe Ltd. reported that 68% of all malware it blocked in May was found on legitimate sites that had been hacked, more than quadruple the level of a year earlier.
Such flaws can be used to steal user cookies, to steal Web site log-in credentials and to exploit users' trust of a site in other ways. In theory, they can be shut down quickly once the owner of the site is made aware of the problem.
However, the techniques used by hackers are highly automated, allowing them to "colonize" large numbers of vulnerable sites at once, ScanSafe noted. By contrast, the fixes are not necessarily so easy, researchers have noted.
In a research note in May, F-Secure Corp. noted that one legitimate site had been repeatedly hacked and used to spread malicious code, and each time, it needed to be contacted to fix the problem.
"The site cannot simply be pulled offline without collateral damage to the legitimate business. So the Web site's administrator must be contacted to repair the damage," said F-Secure researcher Sean Rowe in the note.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts