恶意程序瞄准Apache,劫持多家网站
2013-04-07 21:09:46 阿炯

本站赞助商链接,请多关照。 近日一名为'Darkleech'的恶意程序工具正以最流行的Web server Apache为目标,通过在网页中植入恶意代码将浏览者重定向到第三方恶意网站。它至今已劫持2万多个网站, 其中包括知名网站如《洛杉矶时报》。目前还不清楚攻击者利用了什么弱点入侵Apache机器,安全研究人员怀疑漏洞可能存在于用于管理网站的软件如 Plesk和Cpanel中,也不排除密码破解和社会工程等攻击方法的可能性。研究人员不清楚Darkleech究竟感染了多少网站,因为它利用了复杂的手段避开检测:如果来自安全公司和托管公司的IP地址访问了被感染的网站,它不会在终端用户展示的网页中嵌入恶意链接。

Researchers also don't know precisely how many sites have been infected by Darkleech. The server malware employs a sophisticated array of conditions to determine when to inject malicious links into the webpages shown to end users. Visitors using IP addresses belonging to security and hosting firms are passed over, as are people who have recently been attacked or who don't access the pages from specific search queries. The ability of Darkleech to inject unique links on the fly is also hindering research into the elusive infection toolkit.

The injected HTML iframe tag is usually constructed as IP address/hex/q.php. Sites that deliver such iframes that aren't visible within the HTML source are likely compromised by Darkleech. Special "regular expression" searches such as this one helped Landesman ferret out reported iframes used in these attacks. Note that while the iframe reference is formed as IP/hex/q.php, the malware delivery is formed as IP/hex/hex/q.php.

参考地址:
Ongoing malware attack targeting Apache hijacks 20,000 sites

Darkleech infects scores of Apache servers