IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Fast-Moving Web Threat Spreading Around the World

Threat relies on common Web site "iFrame" vulnerability to inject malicious code into otherwise legitimate Web sites.  

Over the weekend, an accelerating infection was discovered in Italy of seemingly legitimate Web pages loaded with malicious code that could plant a keylogger to steal user passwords, or turn computers into proxy servers for various other attacks. Data indicates that tens of thousands of users worldwide have already accessed compromised URLs, oblivious to the threat as a result of their natural Web surfing activity. The initial HTML malware takes advantage of a vulnerability in so-called "iFrames" that are commonly used on Web sites and commonly exploited. Researchers believe it was probably initially an automated attack, created from a computer Trojan-making kit.

On the IP page where the affected browser is initially redirected, the malware toolkit statistics page displays information on how users visiting legitimate Italian Web sites are getting redirected to the host from where the download chain begins.

The spreading mechanism is a complex chain, but it relies on Web site owners being unaware that they are compromised, and Web site users being unaware that surfing through seemingly legitimate pages can actually be part of an infection process.

Once the user visits any of the said Web sites, the affected computer is directed to another IP address that contains the malicious JavaScript detected as JS_DLOADER.NTJ. This JavaScript then downloads a new member in the infection series detected as TROJ_SMALL.HCK. Trying to cause a buffer overflow on the user's Internet browser, JS_DLOADER.NTJ exploits browser vulnerabilities. Through this, it is able to download TROJ_SMALL.HCK. On initial testing, TrendLabs researchers observed that this malicious JavaScript appears to be "browser-aware" in that it can choose which vulnerability to take advantage of depending on the browser.

TROJ_SMALL.HCK, in turn, downloads TROJ_AGENT.UHL and TROJ_PAKES.NC. TROJ_AGENT.UHL can act as a proxy server that allows a remote user to anonymously connect to the Internet via an infected computer. TROJ_PAKES.NC, on the other hand, is dumped in the user's temporary folder and downloads the keylogging information thief TSPY_SINOWAL.BJ.

Sign up for GovTech Today

Delivered daily to your inbox to stay on top of the latest state & local government technology trends.