Innocent surfers drafted into ZOMBIE ARMY by sneaky XSS vuln

  • 25 April 2014
  • 0 replies
  • 652 views

Userlevel 7
Badge +52

Javascript snafu turned 22,000 bods into unwitting DDoSers

Visitors to a video distribution website were unwittingly turned into participants in a hacker's DDoS battle against a third-party site earlier this month.
DDoS mitigation firm Incapsula identified the video website as Sohu.TV, after the Chinese streaming site plugged a vuln that enabled the browser-based botnet attack to happen.
 Sohu.TV allows its users to log into the site. The DDoS attack was enabled by a persistent XSS (cross site-scripting) vulnerability that allowed the offender to inject JavaScript code into the  tag associated with profile image.
As a result, every time the image was used on the one of the site’s pages the malicious code was also embedded inside it, to be executed by every future visitor to open that page, Incapsula explains.
 
The traffic hijacking technique was used to flood an unnamed third-party target, a client of Incapsula's, with more than 20 million requests from 22,000 users. The size of the attack is modest in the current era of gigabit-sized crapfloods and it's the subtle and sneaky technique used to recruit unwitting zombie drones that makes the attack noteworthy.
 
Full Article

0 replies

Be the first to reply!

Reply