Network Solutions sites hacked again
Newest wave infects hosted sites, sends users to Ukrainian attack server
Computerworld - A week after Web hosting company Network Solutions LLC dealt with a large-scale infection of WordPress-driven blogs, the company acknowledged that other sites it hosts have been compromised.
"We have received reports that Network Solutions customers are seeing malicious code added to their websites, and we are really sorry for this experience," said company spokesman Shashi Bellamkonda in a Sunday blog post. "At this time, since anything we say in public may help the perpetrators, we are unable to provide details."
On Monday, another Network Solutions spokesperson declined to get more specific or answer questions, including queries about what moves the company was making and how many sites had been affected. "At this time, we believe this is affecting a subset of our hosting customers," said Susan Wade, director of corporate communications at Network Solutions. "For now, it's difficult to make a conclusive statement or provide more details publicly."
According to the StopMalvertising blog, the attacks planted a rogue IFRAME on the hacked sites to shunt users to the attack server. That server then launches multiple exploits, including an attack kit of ActiveX exploits and three more that take advantage of Adobe Reader vulnerabilities, against visiting PCs.
Several browsers, including Microsoft's Internet Explorer 8, Google's Chrome and Mozilla's Firefox, display warnings when users are redirected to the attack site. "This web page ... has been reported as an attack page and has been blocked based on your security preferences," Firefox reports in its warning.
Network Solutions had characterized the earlier attacks targeting WordPress-crafted blogs as a file permissions issue, and it initially seemed to blame users' weak passwords for the attacks. Although the company never disclosed how the blogs were hacked, it said it had addressed what it called the "root cause" by April 11.
Yesterday, Bellamkonda hinted that the newest attacks were conducted differently than those against WordPress blogs hosted by his company. "It may not be accurate to categorize this as a single issue such as 'file permissions,'" he said. He also said that passwords were "not related to this issue."
Network Solutions declined to say today whether it had figured out how the second wave of attacks was carried out. "Our teams continue to work around the clock to combat this threat to us and our customers. We are also continuing to actively investigate the issue," said Wade.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts