Malicious Widget Hacked Millions of Web Sites

A security expert estimates that between 500,000 and 5 million Network Solutions-hosted Web sites have been spreading malware for months.

By Gregg Keizer
Mon, August 16, 2010

Computerworld — As many as five million Web sites hosted by Network Solutions have been serving up malware, probably for several months, a security expert said today.

How to Fight Malware
A Layman's Glossary of Malware Terms

"This is one of the biggest infections for drive-by download attacks that I've seen," said Wayne Huang, co-founder and CTO of Santa Clara, Calif.-based Armorize Technologies, a Web application security company.

Network Solutions disputed Huang's estimate of between 500,000 and 5 million infected sites, but was unable to provide its own count.

Huang said his firm's researchers initially tracked the infection to a widget installed by Network Solutions on its GrowSmartBusiness.com site, then later discovered that the same widget was installed by default on all "parked" domains hosted by the Herndon, Va. hosting giant.

Parked domains are those that have been registered, but lack any owner-provided content. Malware makers and scammers have used these under-construction sites in the past to spread attack code or artificially boost search site rankings to dupe consumers into visiting.

"The largest mass infection I can remember was 1.1 million pages," said Huang. "This is a lot bigger."

The widget turned every infected domain into a drive-by attack site that launched the multi-exploit "Nuke" toolkit against users running Internet Explorer, Firefox, Chrome and Opera. If the kit successfully hacked the browser, a Trojan downloader hit the Windows PC, searches were redirected and pop-up advertisements appeared.

Several of the antivirus programs that recognized the downloader identified it as a variant of "Koobface" , a malware-spreading worm best known for attacking users of social networks such as Facebook.

Huang said that the attackers were making money by serving up the ads to infected machines, and further spreading the malware by copying the attack code to any of several peer-to-peer networks already installed on the system.

Additional malicious script was dropped into the infected sites that only targeted users in Taiwan and Hong Kong.

Using several search engines, Huang estimated that that infected widget appeared on between 500,000 and 5 million domains. Monday, he bet on the bigger of the two numbers. "Search engines are generally not keen on indexing parked domains," he said, saying that Yahoo (YHOO) and other search sites provided may thus undercount infected domains.

Network Solutions contested Huang's estimate. "The numbers reported over the weekend are not accurate," said company spokeswoman Susan Wade. "We're still investigating to determine the number affected."

Although Network Solutions has disabled the widget on all parked domains and has taken the GrowSmartBusiness.com site offline, the widget remains on approximately 5,700 active sites that manually installed it, Huang said. Nor has Network Solutions scrubbed the malicious script targeting users with IP addresses located in Taiwan and Hong Kong.

Continue Reading

Originally published on www.computerworld.com. Click here to read the original story.
Our Commenting Policies