Hackers expand massive IFRAME attack to prime sites

Hackers expand massive IFRAME attack to prime sites

The attacks have spread to a long list of high-profile sites

The massive attacks against hundreds of thousands of Web pages that started earlier this month has spread to some of the Internet's most prominent US sites, including those for USA Today, ABC News, Target and Wal-Mart, researchers said Friday.

Dancho Danchev, the Bulgarian security researcher who first reported the attacks two weeks ago, said that the attacks had spread to a long list of high-profile sites, which have had their search results poisoned with malicious IFRAME code. "The attack's been ongoing for almost a month now," Danchev said in an e-mail.

According to both a follow-up post by Danchev to his own blog, and analysis conducted by researchers at Symantec, hackers have inserted IFRAME code into the saved search results of an unknown number of legitimate sites. People who visit those sites and use the compromised search tool are redirected by the IFRAME code to rogue security software and bogus codec sites, which in turn download malware to the victimized Windows PCs.

The attack code that eventually ends up on users' machines includes newer variants of the Zlob Trojan horse, as well as other backdoors and downloaders.

Danchev identified four IP addresses that he claimed host the malicious files; Symantec backed up his findings. "We have confirmed the attack here at Symantec," said Joji Hamada, a Symantec researcher, in a short post to the company's security blog.

The IP addresses Danchev fingered include:

The four addresses are associated with servers located in the US, Panama and Germany, Danchev said.

"The main IPs behind the IFRAMES are still active, new pieces of malware and rogue software [are] introduced, hosting for which is still courtesy of the Russian Business Network, and we're definitely going to see many other sites with high page-ranks targeted by a single massive SEO [search engine optimization] poisoning in a combination with IFRAME injections," said Danchev in his blog post.

When Danchev raised the alarm earlier this month, the compromised sites included a mix of both legitimate and questionable URLs, including those for the North Carolina State University library and the US government's Medicare program, as well as BitTorrent sites serving up pirated software.

"In the past, we've seen many low-profile sites being targeted with the IFRAME attack," Hamada added, "but this time the list of hacked sites include many high-profile sites as well. This is very disturbing, because many big corporations often go out of their way to protect themselves, yet [they] get hit like this."

Danchev identified a long list of affected sites, including,,,,,,,,,,,, and those for the University of Vermont and Boise State University.

Symantec recommended that network administrators block both incoming and outgoing traffic to the four IP addresses, and Hamada urged IT staffs to take another sweep through their servers. "It might a good time for everyone to audit their servers again," he said.

Users can protect themselves by rejecting any request to download an unexpected codec or security program.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.


ARN Innovation Awards 2022

Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.

EDGE 2022

EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.

Show Comments