iTnews

New SQL attacks emerge

By Shaun Nichols on Aug 11, 2008 8:46AM
New SQL attacks emerge

Security researchers are warning of a new round of SQL attacks being reported.

Security researchers are warning of a new round of SQL attacks being reported.

Researchers at F-Secure are reporting an outbreak of attacks that mainly target Chinese sites.

Attackers have been using SQL vulnerabilities to inject malicious code into individual web pages. The code then redirects the user to an attack page, which attempts to exploit a number of vulnerabilities on the user's system and install malware.

If the attack is successful, the user is infected with a trojan that logs and transmits password information for a number of online games.

The company noted that the attacks appear to be targeting Chinese-language sites and software vulnerabilities almost exclusively.

"With all the attention on China these days, especially in conjunction with the Beijing 2008 Olympics Games, and with ‘China’ being one of the more popular search engine keywords at the moment, it makes sense for malware writers to focus their attention on the Chinese web," F-Secure said.

Security firm Sans is also receiving reports of SQL injection attacks. The company estimates that at least 4000 pages are currently infected.

SQL injection attacks have become increasingly popular over the last year. Experts recommend that site administrators follow a series of best practices to prevent attacks and keep a careful eye on log files.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
attacksemergenewsecuritysql

Partner Content

Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Shaun Nichols
Aug 11 2008
8:46AM
0 Comments

Related Articles

  • US cyber security officials see mainly low-impact attacks from logging flaw
  • NSW digital driver's licences 'easily forgeable'
  • Researchers find APT campaigns share known vulnerabilities
  • BLE ‘relay attack’ bad news for Tesla, digital locks
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.