{"id":2411,"date":"2008-04-29T00:00:00","date_gmt":"2008-04-29T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/29\/experts-warn-over-sql-injection-attacks\/"},"modified":"2021-12-30T11:41:17","modified_gmt":"2021-12-30T11:41:17","slug":"experts-warn-over-sql-injection-attacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/29\/experts-warn-over-sql-injection-attacks\/","title":{"rendered":"Experts warn over SQL injection attacks"},"content":{"rendered":"<p>Attackers are increasingly exploiting common database vulnerabilities to leave behind code on thousands of sites, redirecting visitors to servers that host malicious downloads, security experts warned last week.  The attacks, which apparently started at the beginning of April, attempt to use any field on a Web site that accepts user input to execute commands on the database that stores the site&#8217;s information.  In the latest spate of compromises, unknown attackers used SQL injection techniques to create malicious iframe blocks on legitimate Web sites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visitors to a compromised Web site could find their browser executing a Javascript file &#8212; simply named 1.js or 1.htm &#8212; embedded in the iframe, leading to another site that would attempt to install keylogging software by exploiting several different vulnerabilities.<\/p>\n<p>&#8220;The exploits target Microsoft applications, specifically browsers not patched against the VML exploit MS07-004 as well as other applications,&#8221; security firm Websense stated in a research note last week.  &#8220;At the moment it appears that a small set of people are behind these attacks,&#8221; the group said.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/729?ref=rss<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2411","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2411"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2411\/revisions"}],"predecessor-version":[{"id":4898,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2411\/revisions\/4898"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}