Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Businesses Google The Internet IT

Drive-By Download Poisons Google Search Results 136

snydeq writes "A new attack that peppers Google search results with malicious links is spreading quickly, CERT has warned. The attack, which can be found on several thousand legitimate Web sites, exploits flaws in Adobe software to install malware that steals FTP login credentials and hijacks the victim's browser, replacing Google search results with links chosen by the attackers. Known as Gumblar because at one point it used the Gumblar.cn domain, the attack is spreading quickly in part because its creators have been good at obfuscating their attack code and because they are using FTP login credentials to change folder permissions, leaving multiple ways they can get back into the server."
This discussion has been archived. No new comments can be posted.

Drive-By Download Poisons Google Search Results

Comments Filter:
  • Sophos (Score:5, Informative)

    by Spad ( 470073 ) <slashdot.spad@co@uk> on Tuesday May 19, 2009 @09:04AM (#28010475) Homepage

    According to Sophos [sophos.com], this particular exploit seems to be a hell of a lot more "popular" than other previous web-based malware.

  • Re:Wouldn't... (Score:4, Informative)

    by ZirconCode ( 1477363 ) on Tuesday May 19, 2009 @09:05AM (#28010497)

    I guess this answers your question:

    "Users who visit these compromised websites and have not applied updates for known PDF and Flash Player vulnerabilities may become infected with malware"

    *sigh* Adobe...

  • by vertinox ( 846076 ) on Tuesday May 19, 2009 @09:06AM (#28010501)

    On OS X I don't even install the reader anymore.

    But if you use it on Windows and aren't half bothered to find a more secure PDF reader... At least turn the plugin off in Firefox

    Tools > Options > Applications

    Set all Adobe to always ask.

  • by 4D6963 ( 933028 ) on Tuesday May 19, 2009 @09:25AM (#28010703)

    Don't use FTP anyways for anything sensitive like uploading to your website. I used to do that, then got infected by a virus of sorts. What it did was sniff the (non-encrypted) FTP packets to steal credentials, then log in and replace all the index files on the server with its malware infected version.

    That got me to of my websites to be infected and being blocked by Firefox/Google for being reported as attack sites. Now I only use SFTP/SCP.

  • by _LORAX_ ( 4790 ) on Tuesday May 19, 2009 @09:32AM (#28010779) Homepage

    ssh keys with passwords are the best bet. Run an agent so you only have to give your password occasionally and there really is not a lot to steal. They can take the private keyfile, but without the password it is useless. They can use ssh/scp on your behalf, but only until the session ends.

    Putty has an agent for windows, OSX Leopard has an agent integrated with keychain, and Linux has agents that integrate with PAM. OSX and Linux allow it to be SSO with little risk of password/credential theft.

  • by Anonymous Coward on Tuesday May 19, 2009 @09:43AM (#28010893)

    This may not have been intentional, but the Scroogle link in parent post is wrong, and goes to a site that is NSFW.

    Correct link is here [scroogle.org].

  • A little warning (Score:3, Informative)

    by Anonymous Coward on Tuesday May 19, 2009 @09:48AM (#28010959)

    I got infected with this piece of shit (or some other very similar piece of shit) because malicious code on a website somehow forced Adobe Reader to open a PDF, although Foxit had been my default PDF reader for months (in conjunction with the PDF Download add-on, which was somehow circumvented as well).

    Sure, I should have been suspicious instead of just annoyed at AR opening out of the blue. And sure, I should have uninstalled AR when I started using Foxit, instead of just letting it sit on my computer. This is just a warning to other people that are as stupid as me.

  • by Anubis350 ( 772791 ) on Tuesday May 19, 2009 @09:57AM (#28011049)
    if they have can use ssh from your existing session they can: cat $NEW_PUBLIC_KEY >> ~/.ssh/authorized_keys
  • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday May 19, 2009 @10:16AM (#28011313) Homepage Journal

    Install mozplugger and you can use evince to view PDFs inside of Firefox. If you install it on Ubuntu it happens automtically. It will use acroread if it's installed, I think; it will also use kpdf if you happen to be on Kubuntu, and I think xpdf for Xubuntu.

  • by gparent ( 1242548 ) on Tuesday May 19, 2009 @10:18AM (#28011333)

    Nowadays I just use the 'ftp' command in the shell no matter what operating system I'm using. Yeah, it's annoying to change directories both locally and remotely by hand (without even tab-complete!) but you know it sure beats being that guy that lost all his shit (and maybe some other people's) to something like this.

    You realise FireZilla makes this 100 times easier and is just as secure, right?

  • by foniksonik ( 573572 ) on Tuesday May 19, 2009 @10:24AM (#28011417) Homepage Journal

    I had 6 websites infected by this last month. Flash and PDF downloads starting in iframes offscreen.... based out of China.

    Not sure if it was a web exploit or ftp login theft. We looked at both early on as the footprint was confusing in that things were happening that shouldn't be possible without direct access to the server via ftp.

    We changed all passwords to be sure that there weren't any old ones floating around on insecure PCs in the company or with clients, then updated all applications do remove any known exploits. Then added in rewrite rules to stop libwww and other known agents from accessing any files via the web.

    Seems to have worked, no more exploits happening (lots of tagging was happening in addition to Gumblar).

    It's odd that it took so long for this advisory to come out though. Maybe we should have reported it but we did not know it was new as both exploits were known at the time, just no connected with a specific initiative by a hacker/botnet.

  • Re:Wouldn't... (Score:3, Informative)

    by TheP4st ( 1164315 ) on Tuesday May 19, 2009 @10:42AM (#28011671)
    TFA [infoworld.com] says:

    Security experts say that if you're using a fully patched system with up-to-date security software, you should be protected from these attacks. To date, they've worked by hitting the victim with malicious PDF or Flash files.

  • Re:Google Attacks (Score:2, Informative)

    by LordLimecat ( 1103839 ) on Tuesday May 19, 2009 @11:02AM (#28011965)
    It does care for connections--ive seen this particular infection, and it doesnt care what browsers you install, or whether you install new ones, or use firefox portable. If http traffic leaves the computer for google | yahoo | live et al., it gets modified enroute. You get returned legitimate results in the correct order, but all the links are redirected to another site. Its browser-agnostic. I would imagine that it wouldnt care about encryption, since its on your computer and it could just do the injection after decryption takes place.
  • What is is NSFW? (Score:1, Informative)

    by Snaller ( 147050 ) on Tuesday May 19, 2009 @11:07AM (#28012063) Journal

    What is is NSFW?

  • I've seen this. (Score:5, Informative)

    by rincebrain ( 776480 ) on Tuesday May 19, 2009 @11:10AM (#28012105) Homepage

    I got to clean out a system with this about a week ago. It was really nasty.

    The worst part was that I spent the better part of two days trying to figure out why the search links were still being poisoned, even after nothing on several LiveCDs found anything...it turned out that it had installed an invisible Firefox plugin/extension which was doing it.

    Exciting, huh?

  • by Anonymous Coward on Tuesday May 19, 2009 @11:22AM (#28012257)

    You understand that now, thanks to you, people will intentionally click on the OP's link. And fill firefox with tabs from that page. For about 5 minutes or so.

  • by rhizome ( 115711 ) on Tuesday May 19, 2009 @11:48AM (#28012671) Homepage Journal

    or just use foxit

    same bug [computerworld.com.au]

  • Re:Google Attacks (Score:3, Informative)

    by afxgrin ( 208686 ) on Tuesday May 19, 2009 @11:56AM (#28012783)

    Hey - thanks for the link to a nice website. :-)

  • by fluffman86 ( 1006119 ) on Tuesday May 19, 2009 @12:03PM (#28012893) Homepage

    In Windows, I like Sumatra [kowalczyk.info]. It's smaller and faster than Foxit, and doesn't allow javascript and crap that causes problems in Adobe Reader. It does, however, sometimes have trouble rendering some more complicated pdf's, but you could always keep foxit around for that rare occasion.

  • by PitaBred ( 632671 ) <slashdot&pitabred,dyndns,org> on Tuesday May 19, 2009 @02:19PM (#28014905) Homepage
    I tend to make authorized_keys2 read-only, and owned by root. I can change that if I need to add another key, but that's so rare that it's well worth the extra security.
  • by BenoitRen ( 998927 ) on Tuesday May 19, 2009 @05:37PM (#28018033)

    You make a good point. There's one thing that I find fault with, though:

    I hope HTML + CSS + ECMA stop being constantly updated

    Where do you see constant updates? HTML 4.01 has been out since 1997 or so. CSS2 has been out since 1998. HTML5, CSS2.1 and CSS3 are still in draft stage, though I will admit that CSS2.1 has been close to completion for quite some time now, which makes it valid for implementation.

    I can't argue about ECMAScript. It seems to get an update a little quicker than the previously-mentioned technologies, though.

BLISS is ignorance.

Working...