Amnesty International's UK website served up Gh0st RAT for two days

Powered by SC Magazine
 

Injected via Java.

The Amnesty International UK website was recently compromised for two days to serve the Gh0st RAT.

Injected via the Java exploit that led to the creation of the Apple Flashback botnet, Websense said that during 8-9 May, website users risked having sensitive data stolen and perhaps infecting other users. The issue was rectified.

Websense said that once an exploit is successful, a file download is initiated from a URL that includes an executable that creates a new binary file in the Windows system directory.

“Analysing this low AV detected binary file, we recognise that this is a variant of the well-known remote administration tool Gh0st RAT, which is used mainly in targeted attacks to gain complete control of infected systems,” it said.

This allows the controller to access a user's files, email, passwords and other sensitive personal information.

Carl Leonard, senior manager of Websense Security Labs, said: “Exploit kits zoom in on vulnerable websites, even ones with good intentions. With a low anti-virus detection rate, Gh0st RAT is a powerful tool that allows backdoor access into infected machines.

“Companies need effective real-time security to protect against infection. Without the right defences, it might be much more than a charity donation that the malware authors steal.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Amnesty International's UK website served up Gh0st RAT for two days
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote