A malware attack targeting MySQL.com was detected today redirecting users to malicious sites hosting a notorious crimeware kit.
According to researchers at Armorize, the Oracle-owned Website was compromised today but has since been cleaned up. While the attack was underway, users who visited the site were infected and redirected to a site hosting the BlackHole exploit kit.
“(The malicious domain) exploits the visitor’s browsing platform (the browser, the browser plugins like Adobe Flash, Adobe PDF, etc, Java, …), and upon successful exploitation, permanently installs a piece of malware into the visitor’s machine, without the visitor’s knowledge,” according to the Armorize blog.
“The visitor doesn’t need to click or agree to anything; simply visiting mysql.com with a vulnerable browsing platform will result in an infection.” The attack follows reports that root access to MySQL.com was being sold in Russian cyber-forums for $3,000 US. Trend Micro Senior Threat Researcher Maxim Goncharov noted that the situation shows hackers can profit from their activities in a number of ways, not just selling stolen data.
“We are making this public to stress the fact that hackers do not only profit from selling stolen data or by inserting bad links into spammed or phishing messages, websites and other possible infection vectors,” Goncharov blogged, noting Trend had contacted MySQL.com about the forum posts last week. “In this case, whether sourcec0de’s claim is true or not, it shows how cybercriminals are so brazen as to sell admin access to specific systems, which could be negatively impacted by their break-ins.”
MySQL.com was also hit back in March, when Romanian hackers “TinKode” and “NeOh” took credit for exploiting a SQL injection flaw and subsequently posting a list of usernames and passwords online.
A video of the hack in action is embedded below:
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
