Hi malware fighters,
In the last three months the number of new malicious sites they observe has increased from 100,000 to 200,000 per day to 200,000 to 300,000. Also there is shown a surprising velocity of change in the compromised sites. Part of the effect is that they are being cleaned up quickly, but the attacks are also changed frequently to redirect to different sites, Almost 60% of these sites are up for less than one day. The goal of these techniques seems to be to defeat blacklist-based protections. They calls them transient threats.
What are these web pages? Few are actually put up to serve malware. Some of them are blog comments, some are advertisements, many are legitimate web sites corrupted through HTML/script injection, and many have been corrupted through compromises of SQL servers through SQL injection. These compromised web sites are tricked into redirecting users to the few sites that directly serve the malware.
The combination of the Apache web server and PHP scripting engine are a favorite target of attackers. There are large numbers of vulnerabilities for attackers to exploit and no automated patch system to make sure servers are protected. AV vendors are observing some new attacks which help to obscure the attack; in some of them, the user is redirected from the compromised site to the malicious site only when they were referred through a major search engine.
The actual malware being served varies from fake codecs, game password-stealing attacks to fake anti-spyware. The fake codec sites are the most volatile, with 62% active for less than a day. The fake anti-=spyware sites are more stable, but 28% are active less than a day and the average is less than 2 weeks. (info provided by AVG survey).
Malicious Iframes are part of this scene: you can launch up a query for a particular link (site)
to look for info on Iframes there with jutakys Iframe-detektor:
http://jutaky.no-ip.org/index.php?option=com_content&task=view&id=19&Itemid=32
give in below where it says “Please enter URL etc”… enable JS and wait for the results…
The most effective and versatile browser for detecting iframes and for protecting you from the harmful effects that may result from them is Mozilla Firefox with some very easy to use extensions. NoScript will block malicious javascript which will stop a lot of frame triggers in their tracks. Remember to enable javascript for your PTR programs and forums or you will not be able to use them properly. GreaseMonkey will be necessary if you wish to use one of the iframe detectors. JSView will enable you to see the source of javascript on webpages, this is not an extension for beginners however, it takes a practiced eye to use it effectively. View Dependancies will add an extra tab to your PageInfo view which is useful if something is not showing in the source code, but you just know there is something there.
Are there legitimate uses for a 0 pixel or 5 pixel iframe? Yes, they are often used for traffic tracing, or to initiate a pop up. Just because there is a suspicious iframe, doesn’t necessarily mean that it is a form of cheating. Unfortunately, some forms of 0 iframe detection can give an alert when those legitimate frames are encountered. The amount of malicious Iframes makes out 7% of the total amount of malware found.
polonus