Updated @ 8PM PST 5/3/2010 — Added Information about Rogueware and two additional government sites affected
Time and time again we talk about how amateur and professional hackers alike are able to use automated toolkits which can identify security vulnerabilities on a computer and exploit them with little or no technical skill necessary for the cyber criminal.Â TheÂ spirited script kiddies behind these kits have been runningÂ havoc on the Internet, as many of the kits available can be downloaded in underground forums for free. Â Today, we came across an embedded iframe inside of the Department of Treasury website. Â This iframe (pictured below) is used to silently load one of the elenore exploit kits main URL’s, which in turn determines what’s the best available exploitation method for the browser accessing the site.
Upon accessing the US Treasury website (treas.gov, bep.gov, or moneyfactory.gov), the iframe silently redirects victims through statistic servers and exploit packs which will carry the victim onto the second stage of the attack.
In my case, the exploit kit figured that Java was the best method of infecting my test machine,Â although several exploitation methods (mainly PDF) are used by these kits. Â Â It’s still unclear what the original entry point was into the US Treasury website, and I don’t suspect that the US Government will release detailed report about the compromise, but these threats usually make their way onto websites that have outdated server software, web applications, and/or through web application security vulnerabilities such as SQL injection.
After you are infected, your web browser will start redirecting you to ads and other nasty things, such as Rogueware:
I would like to use this post to remind you all to update your web applications and web servers just as frequently as you would your own computer. Doing so will help prevent your website from being hacked and used to propagate these threats on the Internet.Â You, your visitors, and many others browsing the Internet will remain one step closer to a safer browsing experience on the Internet.
Do these researchers contact the victims before they announce these findings?
Yes, Sean-Paul contacted the victims before publishing anything. Good question though 😉