First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Trend Micro site infected users with Trojan
- — 14 March, 2008 17:12
Antivirus vendor Trend Micro confirmed Thursday that "some portions" of its site had been hacked earlier this week, but hedged when asked if those pages had been serving up attack code to unsuspecting visitors.
"I can't confirm or deny the details," said Mike Sweeny, a spokesman for the Tokyo-based security company, on Thursday afternoon. "Some pages were compromised, but we took those pages down and took corrective action hours ago." When pressed for more information, Sweeny would only say the attack was "under analysis".
But media reports from Japan, and a blog post by a rival, U.K.-based Sophos Plc., offered more information. The English-language edition of the Yomiuri Shimbun , one of Japan's largest newspapers, said Trend Micro's site was hacked around 9:00 p.m. Sunday, Tokyo time (7:00 p.m. Eastern, on Saturday, in the US).
"When users viewed any of the modified pages, they were reconnected to other sites without realizing it, and a type of virus was installed on their computer that causes them to download other viruses in a series," said the Yomiuri Shimbun.
Security rival Sophos added more details late Thursday in a post to its blo. There, Graham Cluley, a Sophos senior security consultant, claimed that the hack had been an SQL injection attack and included a link to an alert Trend placed on its Japanese-language site that identified the malware as JS_DLOADER.TZE. The alert also said that users could have been infected by accessing one of 11 infected pages on the Japanese site or 20 pages on the English site, or by clicking a link embedded in the malware's name. All the pages were part of Trend Micro's malware encyclopedia, a searchable database of viruses, Trojans and worms.
Sweeny, Trend's US spokesman said "about 32" pages were involved, "most of them from the encyclopedia".
Security vendors swung into action late Thursday with warnings of their own, even though information was in short supply. Symantec, for example, warned customers of its DeepSight threat network of the reports of ongoing attacks. "Our honeypots are flooded with known attacks targeting older vulnerabilities in the same manner," wrote Patrick Jungles, a Symantec analyst, in the alert. "Although the attacks regularly observed by our honeynet may not all be directly related to this recent grouping, it shows that the attacks are successful enough that they warrant ongoing efforts to obtain new distribution servers."
The script injection attack tracked by McAfee that may have struck Trend Micro's site is not the only mass infection currently plaguing users worldwide. Another campaign that began about a week ago has taken to subverting Web sites' search caches with rigged IFRAMEs, then redirecting visitors to malicious sites that install malware.
The infected-page tally for these IFRAME attacks stands at more then 401,000, according to Dancho Danchev, the Bulgarian researcher who first reported the large-scale attack.
Although a warning had been posted on Trend Micro's Japanese-language site, as of 9 p.m. Eastern on Thursday, nothing similar was visible on the English edition.