Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

Red Cross Hacked Again!!!

image
THREATLABZ
August 12, 2010 - 2 min read
It seems as though attackers are fond of Red Cross sites as this isn’t the first time that we’ve blogged about a compromised Red Cross site. The victim this time was the Red Cross of Serbia. Previously, they hacked the site by simply injecting a malicious iframe. Injecting malicious content into static pages on the server side seems to be an emerging trend. Let’s analyze how it was done this time.

Screen-shot of the homepage:

ImageScreen-shot of “http://www.redcross.org.rs/” source code:

Image

Some of the infected JavaScript files are,
http://www.redcross.org.rs/java3/menu_common.js
http://www.redcross.org.rs/java3/menu123.js
http://www.redcross.org.rs/java3/fw_menu.js

 

A simple Google search on the domain “obscurewax.ru” suggests that this domain has been used in other attacks as victims can be seen discussing similar injected code on various forums and similar files have been submitted to online malware analyzers. We have also observed that many sites are still infected by the same malicious script. F

 

Although the injected JavaScript file “hxxp://obscurewax.ru/Kbps.js” is no longer accessible, this same file has appeared on other domains. Even though the malicious code is no longer being delivered, it is possible that the vulnerability that led to the attack has not yet been patched and further infection could occur, or the existing malicious content could become active once again. Notifications are being sent to Redcross.

 

Pradeep

 

 

 

 

 

form submtited
Thank you for reading

Was this post useful?

Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.