"They have hit city websites, commercial sites and even government websites, " wrote Sans researcher Donald Smith.
"This type of injection pretty much voids the concept of 'trusted' or 'safe' websites."
Security firm F-Secure said that at least 510,000 pages have fallen victim to the attack.
The compromised sites have been embedded with code that redirects the user to a third-party site at which eight different exploits attempt to install a password-stealing Trojan.
F-Secure and Sans Institute urged administrators to block access to the domains hosting the malware exploit.
The Sans Internet Storm Center recommended blocking access to hxxp:/www.nihaorr1.com and the IP it resolves to 219DOT153DOT46DOT28 at the edge or border of the network.
F-Secure also recommended that administrators of hosting servers check their logs for possible attacks.
The outbreak is the latest in a rash of large-scale attacks this year. In March, a pair of attacks, one infecting 10,000 pages and another compromising 200,000 pages, were uncovered by researchers.
SQL attack hits 500,000 websites
By
Shaun Nichols
on Apr 26, 2008 3:56PM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
New Microsoft CSP rules? Here’s how MSPs can stay ahead with Ingram Micro
How mandatory climate reporting is raising the bar for corporate leadership
Empowering Sustainability: Schneider Electric's Dedication to Powering Customer Success
Shared Intelligence is the Real Competitive Edge Partners Enjoy with Crayon
How Expert Support Can Help Partners and SMBs Realize the Full Value of AI




