<<< Date Index >>>     <<< Thread Index >>>

RE: defacements for the installation of malcode



On Wed, 14 Feb 2007, Jeremy Epstein wrote:
> There was also a really entertaining presentation from Patrick Petersen of
> IronPort at RSA, in which he mentioned use of defaced web sites as proxy
> forwarders for spammers.  According to the presentation, the spammers have a
> fairly sophisticated toolkit that takes over the site and turns it into a
> pharmacy (or whatever) redirect site.  A different goal from the Websense
> presentation, but still a purpose other than simple defacement.

Indeed. I can post some screenshots of some of these tools if you are
interested in them.

Anon remailers, spam tools, etc. More and more spam is being sent using
web servers.

I am looking for someone to volunteer to create spam assasin rules based
on how these tools send mail.

You can find my writeup and link to article on this subject here:
http://blogs.securiteam.com/index.php/archives/815

        Gadi.

> 
> --Jeremy
> 
> > -----Original Message-----
> > From: Gadi Evron [mailto:ge@xxxxxxxxxxxx] 
> > Sent: Monday, February 12, 2007 11:17 AM
> > To: php-wars@xxxxxxxxxxxxxxxxxxxxxx
> > Cc: botnets@xxxxxxxxxxxxxxxxxxxxxx; 
> > full-disclosure@xxxxxxxxxxxxxxxxx; bugtraq@xxxxxxxxxxxxxxxxx
> > Subject: defacements for the installation of malcode
> > 
> > Websense just released a blog post on how sites get defaced 
> > for malicious purposes other than the defacement itself, such 
> > as installing mallicious software on visiting users.
> > 
> > This is yet another layer of abuse of web server attack platforms.
> > 
> > You can find their post here:
> > http://www.websense.com/securitylabs/blog/blog.php?BlogID=109
> > 
> >     Gadi.
> > 
>