Asprox botnet malware morphs

Share this article:
The Asprox botnet, initially exclusively used for phishing scams, is now an SQL injection vector for website attacks.

According to SecureWorks, provider of managed security services, the attack tool has infected more than 2,000 websites as of Thursday afternoon. It is used to grab victims while they're surfing the web, building up the Asprox bot family. The same people behind Asprox are responsible for Danmec, a password-stealing trojan.

Joe Stewart, director of malware research at SecureWorks, has been monitoring Asprox for more than a month. He said it had been the only bot focused on phishing, but that focus changed when he noticed a binary on a system performing SQL injection attacks.

“It appears to be trying to build up the size of the botnet, infecting people through web pages by adding an IFRAME,” Stewart told SCMagazineUS.com on Thursday.

The attacks occur on websites that are running Microsoft SQL-SVR (Server) that already have some sort of vulnerability, he added. Also, the botnet takes advantage of unpatched Microsoft Internet Explorer browsers. The attack targets range from small businesses to universities.

“It is basically working through random Google searches,” Stewart said. “It feeds random phrases and goes out and searches for those phrases.”

The botnet attempts to compromise any page that comes back with an .asp suffix and uses a defined parameter, such as ID.

While Asprox has been a minor player in the botnet field, Stewart said it is obvious it is trying to build itself up in a big way.

Share this article:

Sign up to our newsletters

More in News

Brazilian president signs internet 'Bill of Rights' into law

Brazilian president signs internet 'Bill of Rights' into ...

President Dilma Rousseff signed the legislation on Wednesday at the NetMundial conference in Sao Paulo.

Android trojan sends premium SMS messages, targets U.S. users for first time

Android trojan sends premium SMS messages, targets U.S. ...

An SMS trojan for Android, known as FakeInst, has been observed sending premium SMS messages to users all over the world, including, for the first time, the United States.

Report: DDoS up in Q4 2013, vulnerability scanners leveraged to exploit sites

Report: DDoS up in Q4 2013, vulnerability scanners ...

Researchers observed 346 DDoS attacks in the final quarter of 2013 and attackers used Vega and Skipfish vulnerability scanners to exploit web flaws at financial companies.