IT security and control firm Sophos has reported on its blog that webpages of the US Consulate General in Saint Petersburg, Russia, were compromised by hackers earlier this week. The infected pages have since been cleaned up.
The attack was part of a larger campaign by cybercriminals in which vulnerable web servers were targeted. This resulted in more than 400 webpages around the world being infected over the last week. The majority of the compromised pages were hosted in Russia.
“This latest attack highlights the fact that no organization is immune from infection, and that no matter what the size of the company, it must defend its webpages fully to avoid being stung,” said Fraser Howard, principal virus researcher at SophosLabs. “The hackers have reeled in a big fish on this occasion and will no doubt be very pleased with their catch of the day. Unfortunately, while high profile sites such as the US Consulate can be cleaned up quickly, we are seeing a dangerous number of companies that are failing to act responsibly to retain the sanctity of their sites.”
By retrieving a copy of one of the infected Consulate pages from an internet cache, Sophos experts were able to identify that the cybercriminals had planted malicious code known as Mal/ObfJS-C, that then attempted to load further malware from a remote server. This malware includes an additional malicious script that attempts to exploit several browser vulnerabilities in order to install a Trojan horse that could be used to steal business critical data and personal details.
Sophos recently published a technical paper by Fraser Howard providing an overview of modern malware that uses the web to attack victims. Example attacks are used to illustrate some of the tricks and techniques used by hackers. The roles of “attack sites” and compromised sites are discussed together with some of the technologies that can be used to provide protection.