Malicious Attack Hits A Million Web Pages

Bookmark and Share
More than one million website pages have been hit by a sophisticated hacking attack that injects code into sites that redirect users to a fraudulent software sales operation.

The so-called "mass-injection" attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it.

Websense, which first found evidence of the attack earlier this week, has called it 'LizaMoon,' after the site to which the malicious code first directed its researchers.

Websense, which first found evidence of the attack earlier this week, has called it 'LizaMoon,' after the site to which the malicious code first directed its researchers.

The attack has largely affected small websites so far, he said, with no evidence that popular corporate or government websites have been compromised.

If users do not close the window after typing an infected address, or clicking an infected link, they are redirected to a page showing a warning from 'Windows Stability Center' -- posing as a Microsoft Corp security product -- that there are problems with their computer and they are urged to pay for software to fix it.

Websense said the site appeared to be set up by sophisticated fraudsters out to make money, but it was not clear whether the site also planted malicious software on users' computers if they made a purchase on the site, or if the operation was linked to an identity theft scam.

Websense said some third-party Web addresses containing information about podcasts available on Apple Inc's iTunes service had been compromised, but said Apple appeared to have prevented the malicious links from working.

The attack may take some time to be tamed, warned Runald, as researchers first have to identify the software being compromised, and then website operators have to install updated software.

The attack may take some time to be tamed, warned Runald, as researchers first have to identify the software being compromised, and then website operators have to install updated software.