{"id":2450,"date":"2013-04-03T00:00:00","date_gmt":"2013-04-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/03\/ars-technica-exclusive-ongoing-malware-attack-targeting-apache-hijacks-20000-sites\/"},"modified":"2021-12-30T11:41:22","modified_gmt":"2021-12-30T11:41:22","slug":"ars-technica-exclusive-ongoing-malware-attack-targeting-apache-hijacks-20000-sites","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/03\/ars-technica-exclusive-ongoing-malware-attack-targeting-apache-hijacks-20000-sites\/","title":{"rendered":"Ars Technica: Exclusive: Ongoing malware attack targeting Apache hijacks 20,000 sites"},"content":{"rendered":"<p>Tens of thousands of websites, some operated by The Los Angeles Times, Seagate, and other reputable companies, have recently come under the spell of &#8220;Darkleech,&#8221; a mysterious exploitation toolkit that exposes visitors to potent malware attacks. The ongoing attacks, estimated to have infected 20,000 websites in the past few weeks alone, are significant because of their success in targeting Apache, by far the Internet&#8217;s most popular Web server software. &#8230; Vulnerabilities in Plesk, Cpanel, or other software used to administer websites is one possibility, but researchers aren&#8217;t ruling out the possibility of password cracking, social engineering, or attacks that exploit unknown bugs in frequently used applications and OSes. Visitors using IP addresses belonging to security and hosting firms are passed over, as are people who have recently been attacked or who don&#8217;t access the pages from specific search queries.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Given that these are dynamically generated, there would be no viable means to do a search to ferret them out on Google, etc.,&#8221; Mary Landesman a senior security researcher for Cisco Systems&#8217; TRAC team, told Ars.<\/p>\n<p>Referring to the rogue Apache modules that are injected into infected sites, he added, &#8220;Since late 2012 people have sent me new versions of the malicious modules, so this malware is in active development, which means that it pays off well and the number of infected servers can be high (especially given the selectivity of the malware that prefers to stay under the radar rather than infecting every single visitor).&#8221;<\/p>\n<p>According to recent blog posts published here and here by researchers from security firm Securi, Darkleech uses rogue Apache modules to inject malicious payloads into the webpages of the sites it infects and to maintain control of compromised systems. They note the third-party attack sites host malicious code from the Blackhole exploit kit, a suite of tools that targets vulnerabilities in Oracle&#8217;s Java, Adobe&#8217;s Flash and Reader, and a variety of other popular client software. &#8220;It looks like the attackers were beforehand well-prepared with some penetration method to gain web exploitation which were used to gain shell access and did the privilege escalation unto root,&#8221; the writer of the latter blog post wrote last week, adding that he wasn&#8217;t at liberty to discuss the precise method.<\/p>\n<p>The Apache server compromise in many ways resembles a mass infection from 2008 that also used tens of thousands of sites to silently expose visitors to malware attacks. &#8230; Because the server malware is designed to conceal itself and because so many individual systems are affected, it can be next to impossible for any one person to gain a true appreciation for the scope of attack.<\/p>\n<p>Link: <a href=\"http:\/\/arstechnica.com\/security\/2013\/04\/exclusive-ongoing-malware-attack-targeting-apache-hijacks-20000-sites\/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29\">http:\/\/arstechnica.com\/security\/2013\/04\/exclusive-ongoing-malware-attack-targeting-apache-hijacks-20000-sites\/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2450","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2450"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2450\/revisions"}],"predecessor-version":[{"id":4937,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2450\/revisions\/4937"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}