AskMen.com website redirects to Caphaw malware, WebSense says

High-traffic websites can potentially expose thousands of visitors to automated attacks

Injected JavaScript on the main page of AskMen.com was redirecting visitors to domains that delivered malware, according to vendor WebSense.

Injected JavaScript on the main page of AskMen.com was redirecting visitors to domains that delivered malware, according to vendor WebSense.

AskMen.com, a popular website with millions of monthly visitors, was redirecting visitors to other domains that delivered the Caphaw malware, according to security vendor WebSense.

The website, which is published by Ziff Davis, has been notified, but WebSense has not received an acknowledgment, wrote researcher Abel Toro on a company blog. AskMen.com could not immediately be reached for comment.

It's a common tactic for hackers to compromise legitimate high-traffic websites, causing visitors to be redirected to other domains that have been engineered to run an automated attack looking for software vulnerabilities.

"An attack of this scale can potentially infect tens of thousands of unsuspecting users due to the nature of the attack and the high popularity of the website," Toro wrote.

Hackers had injected JavaScript code on multiple parts of the landing page of AskMen.com, which then redirected people to other domains hosting the exploit code, Toro wrote. The injected code was found at the bottom of legitimate JavaScript pages on AskMen's site, he wrote.

The domains hosting the exploit code are constantly changing, Toro wrote. The injected JavaScript code takes the current date and then uses an algorithm to hash that data, which generates a domain name where the hackers have hosted the exploit kit.

A new attack domain is generated every day, as such malicious URLs are usually blacklisted after a short time by security companies. That domain calculation is predictable, however, which allowed WebSense to calculate future domains that will be used, Toro wrote.

Those malicious domains are likely hosting the "Nuclear Pack" exploit kit, which is an attack tool that hunts for software vulnerabilities. In the AskMen.com attack, the Nuclear Pack tries exploits for either outdated Java or Adobe Systems' Reader software, Toro wrote.

If the attack is successful, a malicious software called "Caphaw" is installed, which has complete control over the computer, Toro wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags securityAskMen.comExploits / vulnerabilitiesmalwarewebsense

More about Adobe SystemsAdobe SystemsToro Australia

Comments

Comments are now closed

Payment Adviser finds value in desktop-as-a-service

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]