Mass SQL injection attacks still scaling up

Share this article:

The mass SQL injection attacks that gained attention earlier this week are continuing, with some 210,000 pages infected so far.

All of the attacks are coming from IP addresses based in China, Amichai Shulman, CTO of database security firm Imperva, told SCMagazineUS.com Thursday. 

“This is something unique, as usually attacks of this nature come from infected bot PCs based all over the world rather than in one country,” he said. “In this latest wave, we have recorded the attack coming from more than 60 servers based in China, attacking sites around the world, rather than the global network typically seen in such attacks.”

The attack works in two stages. The first is to infect the target web pages, and then when visitors browse to the infected pages, malware is downloaded to their machines.

“They have a counter to tally the number of infected machines, and as of Wednesday, the number was up to 1.25 million downloads of the malware,” Shulman said.

There are different regional attacks taking place, but all are infecting English-language websites. The malware involved appears to have been compiled on a Chinese-language computer, Mary Landesman, ScanSafe's senior security researcher, told SCMagazineUS.com Thursday.

“Collectively, the number of pages infected can be found by searching for the malicious IFRAME that has been implanted on the pages,” she said.

What's the motive behind these attacks? It could be anything, but Shulman said he thinks it may be the start of another botnet.

“It looks like it is part of a botnet," he said. "The first thing the malware does is communicate with a command-and-control center."

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.