Trojan Buzus Attack Passes 1.5 Million Infected Sites
A widlfire-fast SQL injection that started picking up speed last week hasn't slowed down. Last week's hundreds of thousands of compromised sites have grown to more than 1.5 million, eSoft reports.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
A widlfire-fast SQL injection that started picking up speed last week hasn't slowed down. Last week's hundreds of thousands of compromised sites have grown to more than 1.5 million, eSoft reports.The buzus Trojan started gathering more attention -- and more infected sites -- late last week.
According to security firm eSoft, the Trojan has now compromised more than 1.5 million Web sites.
The SQL injection attack blends a variety of infected iframes with redirects to ultimately put information-stealing Trojans in place. The Buzus (aka Buzuz) family of Trojans is well-known for its affinity for financial information and passwords.
This one is not just moving fast, it's mutating -- under the control of its authors -- fast. Time to tighten and re-tighten defenses, limit unnecessary Web surfing, and make sure -- double-sure -- that every one of your employees are doing the same.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024