osCommerce-based mass injection now 3.79 million pages strongby Steve Ragan - Aug 1 2011, 13:45
A mass injection attack, targeting insecure and under patched installations of osCommerce, has impacted more than 3 million pages on the Internet. The latest figures come from security vendor Armorize, who has been following the situation since it started.
According to Armorize, as of July 31, there are more than 3.4 million pages infected with an embedded Iframe pointed to willysy.com. An additional 386,000 pages are infected with an Iframe pointed to exero.eu. All of the infected pages have one thing in common, osCommerce.
If you use a webhost that offers cPanel, osCommerce is one of the many scripts that can be installed with the click of a button. However, while the ecommerce software is popular for small business owners, unless it is maintained, itís often exploited by drive-by attackers. Sadly, many installations of osCommerce are left abandoned, often due to problems with design or configurations, assuming the domain owner simply didnít just lose interest. When this happens, all of those domains are easy pickings to an attacker or their scripts.
There are three vulnerabilities being leveraged in the attacks on osCommerce-driven sites, one disclosed on July 10, another last May, and the final one in May 2010. Once a vulnerability is exploited, malicious Iframes are injected into the siteís code, and in some cases the attackers will upload shell scripts to the domain. The shell scripts allow attackers greater access to the site and the server it is hosted on.
Previously, while researching BlackHat SEO scripts, The Tech Herald discovered several sites with osCommerce installations rooted by similar shell scripts. Itís a common tactic and can be automated in many cases.
Once the site has been compromised, the Iframes themselves will direct visitors to another domain, which pulls data from a third domain, containing yet another Iframe that redirects the victim to a fifth site.
Once the fifth site is loaded, it attempts to leverage one of five browser vulnerabilities in order to infect the system with Malware. The process takes seconds to complete.
Armorize says that scanning logs for the IPs 220.127.116.11, 18.104.22.168, 22.214.171.124, and/or 126.96.36.199 will be the first sign of detecting an infection on a given domain or server.
After that, the infected pages will need to be scrubbed of the injected code. In some cases, especially if the osCommerce installation is not needed or new, it is better to delete everything and start over. However, once cleaned, the osCommerce installation should be checked for updates and properly hardened. Also, it is often a better bet to manually install the software, and avoid one-click installations.
comments powered by Disqus