Image search can lead to malware download
by Manuel Humberto Santander Pelaez (Version: 1)
Reader Stephanie told us that during an image search of a Mussolini image in google found a site downloading malware. I decided to look into this issue further to see what I could find. Before starting, please be careful on what you do, as this page is still alive.
I clicked the image found in google. The following script was received from the host:
The URL loads the following javascript, which is coded:
After decoding, it rises an executable, MD5 ef42a441af5e5a250f18aeb089698c35. It does not perform any changes to the system, but it connects to 69.50.197.243 TCP port 8000 to further download for malware content.
Such attacks are common. How to minimize the risk of these attacks? We can summarize some controls:
- Malware perimeter defense: You can use any malware product to test HTTP, FTP and any other protocol allowed for the inside users.
- Please download files from well-known sites. If you need to download something from unknown sites, please take all measures to check and review the downloaded content before using it.
- I tested noscript against this webpage and it was correctly blocked. I do not recall a similar control for Internet Explorer. Maybe one of our readers can recommend one?
- Host IPS can protect the machine for buffer overflow or similar attacks triggered by exploits or malware.
- And, of course, the Antivirus.
-- Manuel Humberto Santander Peláez | http://twitter.com/manuelsantander | http://manuel.santander.name | msantand at isc dot sans dot org
Comments
Q
Apr 23rd 2011
1 decade ago
Alan
Apr 23rd 2011
1 decade ago
- http://community.websense.com/blogs/securitylabs/archive/2011/04/21/presley-walker-google-image-search-results-poisoned.aspx
21 Apr 2011 (leads to "Neosploit"...)
.
PC.Tech
Apr 23rd 2011
1 decade ago
.
PC.Tech
Apr 23rd 2011
1 decade ago
IE has had this capability since IE5, if I recall correctly.
mechBgon
Apr 23rd 2011
1 decade ago
This is a report with the referrer added:
http://www.urlquery.net/report.php?id=1357
infection vector's are Java and Acrobat Reader, best to keep those up to date ;)
Ewald
Apr 24th 2011
1 decade ago
It seems like when re-opening Firefox (after force-closing it through TaskManager, that it bypassed the "restore session choice" screen and it force-restored the session with this tab even active.
SB
Spam
Apr 25th 2011
1 decade ago
Nick
Apr 26th 2011
1 decade ago