Menu
Speedy attack targets Web servers with outdated Linux kernels

Speedy attack targets Web servers with outdated Linux kernels

Cisco said the attack compromises legitimate websites to redirect visitors to malicious ones

Attacks on web servers running outdated Linux kernels have compromised more than 2,000 websites, according to Cisco.

Attacks on web servers running outdated Linux kernels have compromised more than 2,000 websites, according to Cisco.

Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.

All the affected servers were running the 2.6 version, first released in December 2003, of the Linux kernel, which is the core of the operating system. Most were running a 2.6 Linux kernel version released in 2007 or earlier, wrote Martin Lee, technical lead of Threat Intelligence for Cisco.

"Systems that are unmaintained or unsupported are no longer patched with security updates," Lee wrote. "When attackers discover a vulnerability in the system, they can exploit it at their whim without fear of it being remedied."

After the Web server has been compromised, the attackers slip in a line of JavaScript to other JavaScript files within the website. That code bounces the website's visitors to a second compromised host, which runs another JavaScript file.

"The two-stage process allows attackers to serve up a variety of malicious content to the visitor," Lee wrote.

The visitor is then served pay-per-view fraud pages, which load up advertisements. Other clues indicate some visitors may be served malicious software, he wrote.

One in 15 of Cisco's clients using its Cloud Web Security product had one of their users attempt to request one of the malicious URLs, Lee wrote. The company saw 400 distinct hosts, with a high number in the U.S. and Germany, affected on March 17 and 18, showing "the spread of this attack has been dramatic," he wrote.

About 2,700 URLs have been affected. Because the attack centers on compromising legitimate websites, "security awareness campaigns that train users to be wary of unknown websites may not be effective against trusted websites that become compromised to serve malware," Lee wrote.

The campaign highlights the need for system administrators to continually update their systems.

"Large numbers of vulnerable unpatched systems on the Internet are tempting targets for attackers," Lee wrote. "Such systems can be used as disposable one-shot platforms for launching attacks."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securitymalwaredata breachintrusionCisco Systems

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments