Saturday, May 16, 2009

New Script Outstrips All Other Drive-by Download Risks

Via The Register UK -

A newly-created malicious script has become the source of almost half the drive-by download attacks tracked by one security firm.

JSRedir-R accounts for around 43 per cent of all malicious infections found on websites over the last week, according to a study by net security firm Sophos, published on Thursday. The malware crops up with almost six times the frequency of its nearest rival, iFrame-F (which is recorded in seven per cent of attacks).

The JSRedir-R script is typically found on legitimate websites, hidden behind obfuscated JavaScript, and used to exploit browser vulnerabilities to download malware onto the Windows PCs of visiting surfers via third-party websites under the control of hackers. The malicious script has also cropped up on the 2 Girls 1 Cup scat video viral website.

A chart from Sophos on the relative frequency of different web-based attacks can be found here. More pointers on how the JSRedir-R attack works, and how webmasters might guard against it, can be found here.

No comments:

Post a Comment