iFrame malware analyzed...

Hi malware fighters,

Here is an analysis of a specific malicious hidden iFrame exploit: http://research.zscaler.com/2010/05/malicious-hidden-iframes-using-publicly.html
Another fine read: http://malware.im/from-hidden-iframes-to-obfuscated-scripts/

Scan for hidden iFrame here: http://www.novirusthanks.org/services/scan-websites-for-iframes/

Interesting also: http://www.iframehtml.com/iframe-security.html
Here we also see this activity from time to time:
http://www.google.com/safebrowsing/diagnostic?site=google-analitics.net/&hl=en
No zeroiframes detected!
Check took 0.02 seconds

(Level: 0) Url checked:
htxp://google-analitics.net
Blank page / could not connect
No ad codes identified
But for redirects consider: http://www.robtex.com/r/x?q=google-analitics.net

polonus

Thanks D., will check the links…!
asyn

Hi malware fighters,

Here is 2 recent examples from the real theater: 2010/05/26_20:10 www.sc-storenet/httpd/conf/index.php 85.25.120.70 srv.kosovasitecom. iframe directs to exploit contact@privacyprotect.org 8972 Detected here:
http://www.google.com/safebrowsing/diagnostic?site=sc-store.net


<HTML>
<HEAD><TITLE>502 Bad Gateway</TITLE></HEAD>
<BODY>
<H1>Bad Gateway</H1>
<H4>
The following error occurred:<P>
[code=DNS_HOST_NOT_FOUND] The host name was not found during the DNS lookup. Contact your system administrator if the problem is not found by retrying the URL.
</H4>
<HR>
Please contact the administrator.
</BODY>
</HTML>

That is all false - because in Malzilla we find this: