U.S. Department of Labor website infected with malware
The malware has been linked to a China-based hacking campaign that struck a Fortune 500 company in 2011
IDG News Service - A subdomain of a U.S. Department of Labor website appeared offline on Wednesday after an apparent hack that looks similar to a known China-based hacking campaign nicknamed DeepPanda.
The tampered page, called Site Exposure Matrices (SEM), contains information on toxic substances at U.S. Department of Energy facilities, according to security vendors AlienVault and Invincea.
Hackers planted code on the main SEM page which redirected victims to other pages within the department's website that attacked visitors' computers. Invincea wrote that the site has been fixed, but it appeared to be offline late Wednesday.
When someone was redirected to an infected page, a script surveyed the computer to figure out what versions of software such as Microsoft Office, Adobe Systems' Reader, Java or various antivirus programs it is running, wrote Jamie Blasco, director of AlienVault's Labs.
The attack code then tries to exploit a vulnerability in older versions of Internet Explorer, wrote Anup Ghosh, founder and CEO of Invincea. The vulnerability, CVE-2012-4792, has been patched by Microsoft.
The style of attack is known as a drive-by download. It is particularly dangerous since potential victims merely need to visit a site in order for the attack to be executed.
Once installed, the malicious software attempts to contact a command-and-control server using a protocol linked with "a known chinese actor called DeepPanda," Blasco wrote.
The department could not be immediately reached for comment.
The security company CrowdStrike published a white paper that described DeepPanda as a China-based operation that tried to attack a large Fortune 500 company in December 2011. That attack sought to install remote-access Trojans (RATs), which would allow hackers to steal information from an infected computer.
The U.S. and China have clashed in recent months over cybersecurity. U.S. companies have become increasingly vocal over what they say are technically sophisticated long-term infiltration campaigns originating from within China.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the... All Malware and Vulnerabilities White Papers | Webcasts