The Tech Herald

osCommerce-based mass injection now 3.79 million pages strong

by Steve Ragan - Aug 1 2011, 13:45

A mass injection attack, targeting insecure and under patched installations of osCommerce, has impacted more than 3 million pages on the Internet. The latest figures come from security vendor Armorize, who has been following the situation since it started.

According to Armorize, as of July 31, there are more than 3.4 million pages infected with an embedded Iframe pointed to willysy.com. An additional 386,000 pages are infected with an Iframe pointed to exero.eu. All of the infected pages have one thing in common, osCommerce.

If you use a webhost that offers cPanel, osCommerce is one of the many scripts that can be installed with the click of a button. However, while the ecommerce software is popular for small business owners, unless it is maintained, itís often exploited by drive-by attackers. Sadly, many installations of osCommerce are left abandoned, often due to problems with design or configurations, assuming the domain owner simply didnít just lose interest. When this happens, all of those domains are easy pickings to an attacker or their scripts.

There are three vulnerabilities being leveraged in the attacks on osCommerce-driven sites, one disclosed on July 10, another last May, and the final one in May 2010. Once a vulnerability is exploited, malicious Iframes are injected into the siteís code, and in some cases the attackers will upload shell scripts to the domain. The shell scripts allow attackers greater access to the site and the server it is hosted on.

Previously, while researching BlackHat SEO scripts, The Tech Herald discovered several sites with osCommerce installations rooted by similar shell scripts. Itís a common tactic and can be automated in many cases.

Once the site has been compromised, the Iframes themselves will direct visitors to another domain, which pulls data from a third domain, containing yet another Iframe that redirects the victim to a fifth site.

Once the fifth site is loaded, it attempts to leverage one of five browser vulnerabilities in order to infect the system with Malware. The process takes seconds to complete.

Armorize says that scanning logs for the IPs 178.217.163.33, 178.217.165.111, 178.217.165.71, and/or 178.217.163.214 will be the first sign of detecting an infection on a given domain or server.

After that, the infected pages will need to be scrubbed of the injected code. In some cases, especially if the osCommerce installation is not needed or new, it is better to delete everything and start over. However, once cleaned, the osCommerce installation should be checked for updates and properly hardened. Also, it is often a better bet to manually install the software, and avoid one-click installations.

In formation on hardening osCommerce is here. The Armorize report on the attacks can be viewed here.


 

Comment on this Story

comments powered by Disqus

From Autosaur.com

Lamborghini Goes Through Time Warp

We all know Lamborghinis can go fast ‚ÄĒ but this one seems to have the same hyperspace f...

Average Guys With Average Cars. #average

Great new video from up-and-coming clothing brand the Average Squad. The short was posted by...

This Man Was Too Poor To Buy A Car. How He Treats Them Now Is So Touching

This is one of the most touching videos about cars in a long time. It tells the story of a m...

Lucky Escape from Out of Control Truck

This man had a lucky escape on a New Jersey Turnpike when he had to stop on the road du...

Concept Car Videos from Detroit Auto Show

As at every big car show manufacturers at the Detroit Auto Show 2015 were keen to give us th...