{"id":1583,"date":"2009-08-24T22:16:33","date_gmt":"2009-08-24T21:16:33","guid":{"rendered":"http:\/\/www.combell.com\/?p=1583"},"modified":"2015-06-04T17:44:29","modified_gmt":"2015-06-04T15:44:29","slug":"combell-tech-look-out-for-hackers-via-iframe-injection","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/combell-tech-look-out-for-hackers-via-iframe-injection\/","title":{"rendered":"Combell Tech: look out for hackers via iframe injection"},"content":{"rendered":"<p>Hacking, injection, malware and other types of abuse aren\u2019t new phenomena; every Internet user gets confronted to them fairly fast. Moreover, the methods that are used vary and evolve a great deal and, on top of that, they follow trends. Evolution is essential for hackers because they constantly have to outdistance service providers who want to limit the impact of the abuse.<\/p>\n<p>Every hacking attempt now has a specific motive; the era during which prestige was the only motive in underground hacker circles has long since passed. Hackers use their actions to spread a certain message on a large scale. They can be political in nature, but can also serve a purely commercial purpose.<\/p>\n<p><strong>A new trend<\/strong><\/p>\n<p>The latest trend on the level of Internet-mediated abuse is the injection of iframes in the different files present in hosting packages. These iframes aren\u2019t visible on the website but, in the background, they channel traffic to a given site. This is thus a well thought-out strategy to attract extra visitors to certain sites and, possibly, to gain extra income through Google AdWords.<\/p>\n<p>This hacking method also has 2 supplementary motives:<\/p>\n<ul>To infect your computer via code leakage in Adobe Acrobat<\/ul>\n<ul>To access your local passwords<\/ul>\n<p><strong>Characteristics<\/strong><\/p>\n<p>It is fairly easy to recognize this type of abuse. In the source code of the hacked sites, you will always find an iframe of the following form:<\/p>\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/files\/2009\/06\/iframe2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1468\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/2009\/06\/iframe2.jpg\" alt=\"Iframe injection\" width=\"545\" height=\"47\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/2009\/06\/iframe2.jpg 545w, https:\/\/www.combell.com\/en\/blog\/files\/2009\/06\/iframe2-300x25.jpg 300w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p><strong>How does this get onto your hosting?<\/strong><\/p>\n<p>Research has proven that this method does not rest on bad security features: it is not the server or the network that is hacked, but certain accounts on a server. In the past, mostly websites with code leakage were targeted, but now strongly protected websites also fall prey to it.<\/p>\n<p>Apparently, these hackers succeed to retrieve the FTP password of the hosting package in order to gain access. It goes without saying that, this way, the hackers hold the keys to the realm.<\/p>\n<p><strong>How do they get the FTP data?<\/strong><\/p>\n<p>The true root of the problem is not a hosting problem, but a problem on the computer of the victims. Apparently, the iframes refer you to pages on which tainted PDF files are offered. Through code leakage in Adobe Acrobat, the hackers succeed to place a sniffing tool on your computer, disguised as a seemingly innocent PDF.<\/p>\n<p>On CVE-2008-2992, you can read that what is involved is in fact a \u201cStack-based buffer overflow in Adobe Acrobat and Reader 8.1.2\u201d. The sniffer that gets installed in that fashion can forward your FTP password to the hackers in question without a problem, which provides them access to your package.<\/p>\n<p><strong>How can you protect yourself from this?<\/strong><\/p>\n<p>It is difficult for us, the host, to protect you from this type of hacking, since it is your local computer that gets infected. It is important that you replace Adobe Acrobat version 8.1.2 (or older) as quickly as possible and install the latest version immediately.<\/p>\n<p>If you suspect iframe injection on your computer, you should at least undertake the following steps:<br \/>\nUse your virus scanner to neutralize the virus<br \/>\nAfter the virus has been removed, modify your FTP password as soon as possible<br \/>\nRemove the iframes from your source code<\/p>\n<p>If your site has been blocked by Google, use their Webmaster Tool to be removed from their blacklist.<br \/>\nCustomers who have a unique IP on their hosting can send us a request to enhance firewall stringency. Of course, this can only work if you use a fixed IP through your Internet provider. Thus, we will only allow FTP connections originating from your fixed IP and hackers cannot log into your hosting package. This does not prevent your local computer from being infected, though.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Through a combination of injection on the server and infection of your computer, a spiral effect is created that entraps more and more people. Our observations are that the Adobe Acrobat virus only sends through FTP data, but maybe the virus will evolve in the near future, causing even more damage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking, injection, malware and other types of abuse aren\u2019t new phenomena; every Internet user gets confronted to them fairly fast. Moreover, the methods that are used vary and evolve a...<\/p>\n","protected":false},"author":3,"featured_media":5458,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[66],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud-300x102.jpg",300,102,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",768,262,false],"large":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",750,256,false],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",850,290,false],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",485,165,false],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud.jpg",375,128,false],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/2009\/08\/domainfraud-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Tom","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/tom\/"},"uagb_comment_info":0,"uagb_excerpt":"Hacking, injection, malware and other types of abuse aren\u2019t new phenomena; every Internet user gets confronted to them fairly fast. Moreover, the methods that are used vary and evolve a...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/1583"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=1583"}],"version-history":[{"count":4,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/1583\/revisions"}],"predecessor-version":[{"id":5459,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/1583\/revisions\/5459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/5458"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=1583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=1583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=1583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}