Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/4/2012
02:59 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Latest SQL Injection Campaign Infects 1 Million Web Pages

SANS warns of uptick in 'Lilupophilupop' attack, but Cisco says total number of infected URLs might be 'inflated'

Another SQL injection campaign is literally going viral, with some 1 million URLs possibly infected.

The SANS Internet Storm Center over the weekend counted some 1,070,000 URLs injected with the so-called lilupophilupop.com malware. That's up from 80 pages it had found in early December, according to SANS ISC handler Mark Hofman.

The attackers compromise sites via SQL injection, and it appears to have hit sites worldwide, with the most infections in The Netherlands "NL" domain, with 123,000, and includes some .com and .org sites, as well.

"At the moment it looks like it is partially automated and partially manual. The manual component and the number of sites infected suggests a reasonable size work force or a long preparation period," Hofman said in his blog post on the attack.

But the 1 million URL number might be inflated, says Mary Landesmann, senior security researcher for ScanSafe, which is part of Cisco. That count could include pages also discussing the attacks, she says. "As a result, there is always a huge 'increase' after an initial public report is made. In other words, counting the number of results from a search engine isn’t a good or viable means of measuring the breadth of a compromise," Landesmann says.

Cisco has seen around 650 unique domains hit since lilupophilupop attack first showed up at the end of November. Around 43 percent of the infections transpired between Nov. 30 and Dec. 2, according to Landesmann. "The domains that are affected seem pretty random and small, so I suspect spam or some other social-engineering method is driving victims to the compromised sites, in addition to SEO poisoning," she says.

Mass SQL injection attacks are nothing new. The most recent one, Lizamoon, hit some 500,000 URLs with redirects that push rogue AV software, but was quickly shut down. Automated exploitation is generated via a toolkit built for a specific attack, as was the case with Lizamoon. These attacks typically target a specific application architecture.

[How to prevent SQL injection attacks. See As SQL Injection Attacks Surge, New Report Offers Insight On How To Prevent Them.]

SQL injection basically manipulates an existing SQL query for malicious purposes -- an attacker can take full control over the underlying operating system of the SQL server as well as the Web application.

Unfortunately, SQL injection flaws are consistently some of the most prevalent ones in Web servers.

The lilupophilupop attacks represent one of the biggest SQL injection attacks recently, but it's still much smaller than the size of previous campaigns a few years ago, Cisco's Landesmann says.

"SQL injection isn’t the result of any specific vulnerability, but rather a result of improper input/output handling by the site. It will never entirely go away, but it’s definitely a much, much smaller problem today," she says. "Major hosting providers, large companies, and commercial sites have taken great strides to mitigate their susceptibility and, as a result, the days of a million plus pages/sites impacted by SQLi are probably well behind us."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/6/2012 | 11:36:26 PM
re: Latest SQL Injection Campaign Infects 1 Million Web Pages
For the developers: finding SQL injection and other vulnerabilities in code:
http://www.eweek.com/c/a/Secur...-
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11496
PUBLISHED: 2020-10-19
Sprecher SPRECON-E firmware prior to 8.64b might allow local attackers with access to engineering data to insert arbitrary code. This firmware lacks the validation of the input values on the device side, which is provided by the engineering software during parameterization. Attackers with access to ...
CVE-2020-15822
PUBLISHED: 2020-10-19
In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped.
CVE-2020-24375
PUBLISHED: 2020-10-19
A DNS rebinding vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3.
CVE-2020-7193
PUBLISHED: 2020-10-19
A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
CVE-2020-7194
PUBLISHED: 2020-10-19
A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).