Skip to comments.Millions of sites hit with mass-injection cyberattack (LizaMoon - instructions included)
Posted on 04/02/2011 9:25:45 AM PDT by Libloather
Millions of sites hit with mass-injection cyberattack
By Sarah Jacobsson Purewal
April 1, 2011 10:37 AM ET
PC World - Hundreds of thousands -- and possibly millions -- of websites have been hit with a cyberattack that some are calling "one of the biggest mass-injection attacks we've ever seen."
The attack was discovered on March 29 by security firm WebSense, and the injected domain was called lizamoon.com -- thus, the name of the mass-injection is "LizaMoon." According to WebSense, LizaMoon uses SQL Injection to add malicious script to compromised sites. While the first injected domain was lizamoon.com, additional URLs have since been injected in the attack (WebSense has a full list here).
The method of using an injected script redirects users to a rogue AV site, which tries to get people to install a fake anti-virus program called Windows Stability Center.
When WebSecurity discovered the attack on March 29, 28,000 URLs had been compromised. The number quickly grew to 226,000, including many iTunes URLs (though the malicious code is neutralized by Apple).
The number of infected sites now appears to be over 1.5 million (at the time of this blog post, a quick Google Search shows 1.53 million infected URLs) -- but WebSense is quick to point out that a Google Search is an inaccurate metric. Google search spits back unique URLs, not unique hosts. Thus, there are likely less than 1.5 million infected sites, but WebSense says it's safe to say that the number is in the hundreds of thousands.
The attack continues to rampage across the Internet, and currently doesn't show any signs of slowing down. So don't install any web-based anti-virus software that claims your computer is full of bugs.
(Excerpt) Read more at computerworld.com ...
I know a guy who not only installed the fake AV software, he even PAID FOR IT!!!! I told him to call his CC company IMMEDIATELY! lol
I didn't recognize any of what she read off, and told her to say no, and got her to run her own collection of av stuff.
Nothing was found, BTW, and it was Windows 7 Home.
I wouldn't bite on the anit-virus that popped up, but my computer is still in the shop.
I notified FR, no reply yet.
So how do you check your own website to make sure it’s not infected?
(I have Symantec Endpoint and it says I’m clean.)
I wonder when it really started.The phenomenon of fake AV software has been around a long time. This is just some new variant.
It has tried twice on my system.
I ran AVG and malwarebytes after the attempts .. says I’m clean
Is there anyone, anywhere, with as much brains as God gave a democrat, who doesn't already know that?
I would grep for “ur.php” from /
People still fall for those fave AV sites?
Clue: Beware of any warning message that have flashing exclamation points.
“fave” s/b “fake”
There are several variants of this. I see them on a daily basis. Looks like I’m gonna be even busier now.
My experience is that no matter what you click on eg "No Thanks", "X - to close" "Back (previous window)" etc. the script still pops up the "Checking system" window and listing all the horrible viruses you've got.
My advice in such situations for PC users (MACS don't get viruses ;-):
As an aside - I cannot believe that we don't hammer any of these companies that accept money to fix viruses they just installed on your PC ... follow the money and make THEM pay! IMHO. ;-)
Restarted in protected mode and ran a system reset. Good news, the latest system check point was from that morning prior to installing the Java update. After restoring to that check point system came up completely normal. Spent some time doing a full system scan and all was well with XP and my hardware.
I had a similar attack back a year or two ago. It also blocked the anti-everything package from functioning and insisted that I purchased it for some small ($30 $40??) price. Used the same procedure that time as well (safe mode restart, run system restore). The only difference compared to the latest attack was it came up in the "Blue Screen of Death" and it would not let you do anything else. The latest attack left most everything accessible but kept pimping you about the firewall and anti-virus being down from pop-ups attached to the task bar.
I had it hit me once. The 'giveaway' was that it scanned my entire hard drive (supposedly) in just a few seconds. It did look remarkably 'official', but that's just part of the game.
In safe mode clear your internet cache as well. The fake stuff installs and keeps running from the temporary internet cache and cookie files....if you clear it early your deeper system registry and kernels won’t get corrupted or rewritten.
Thanks - Good advice! ;-)
If you don’t run as an admin these types of virus can’t install. You should run as a user unless install or making changes.
“So don’t install any web-based anti-virus software that claims your computer is full of bugs.”
No sh*t, what gave you that idea?