Javascript include: from attacker to victim & how to check?

2012.11.19

Because of all that happened recently, let me be quick πŸ™‚

Various soft present to automatically add text within webpages on compromised websites.

Those chain of samples for recent attack I followed πŸ™‚

Step1:

Hacker intrude on poorly configured website: thru software flaw, poor configuration or stolen credentials.

Software (shell) uploaded to remotely manage such website, link written in database of compromised websites.

Step2:

Bundle of websites sent a command to add to each (or specific, default for example) page malicious code:

Sample1

Read more…

SakuraEK + Sutra TDS << when You know the path, You walk faster :)

2012.09.06

That day my luck was meeting someone else..

That’s why 3 times I lostΒ  the target, for many reasons.

And I was angry πŸ™‚ And I need something to cheer me up πŸ™‚ So here we are πŸ™‚

Disclamer: All links provided lead to lists of malicious or potentially malicious resources. Do not click there on any link, or don’t run any file, without proper knowledge, env prepared and skills trained.

Today story is about why we should do research by ourself, by hands checking all the results. Otherwise – we’ll loose.

Read more…