Risk
7/2/2008
01:46 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Sony PlayStation Site Hacked With 'Scareware'

The site runs a script that pretends to do an online security scan of your computer and presents a bogus warning message that your PC is infected with malware, researchers said.

A new wave of SQL injection attacks is spreading across the Internet, and Sony USA's PlayStation Web site is among the victims.

"Visiting the affected PlayStation site runs a script that pretends to do an online security scan of your computer, and presents a bogus warning message that your PC is infected with a variety of different pieces of malware," the SophosLabs blog explains. "Users frightened by the scareware 'warnings' might rush to spend money on useless software."

SQL injection attacks involve passing malicious code to SQL databases as user input. An improperly configured or vulnerable SQL application can be made to execute that input. All that's needed is to add HTML into a Web page that calls a script on a malicious site.

Since January, SQL injection attacks have surged across the Web. Researchers at the SANS Internet Storm Center and elsewhere have said that the reason for this is the existence of an automated tool that searches for sites running vulnerable software and attacks them. Attackers can configure the tool to insert any code they want.

Graham Cluley, senior technology consultant, said that the code used in the Sony site attack is just a snippet of code that pulls in content from a malicious site. The malicious code currently just tries to scare visitors to Sony's PlayStation site with bogus malware warnings, but it could just as easily install a keylogging Trojan, he said.

Cluley said that the malware has been active for a day or two and that Sony has been alerted to its presence. "The last time we looked the problem was still present," he said.

This is not a problem exclusive to Sony, however. "We are seeing hundreds of legitimate Web sites affected by this every day," Cluley said. "If you're a business, you need to harden your Web site to stop this from happening again and again."

Cluley noted that users of Firefox 3 should be immune to this attack because it recognizes third-party sites hosting malicious code as part of its new anti-malware functionality. "The good news is that Firefox 3 does actually intercept the attempt to go to the malicious Web site," he said. He also said that a plug-in called NoScript can help keep Firefox 2 and 3 users safe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.