Here's the scenario: Attackers compromise a major brand's website. But instead of stealing customer records, the attacker installs malware that infects the computers of thousands of visitors to the site. The issue goes unnoticed until it's exposed publicly.
Such attacks are a common occurrence, but most fly under the radar because the users never know that a trusted website infected them, says Brian Dye, senior director of product management at Symantec. When his company tracks down the source of such infections, it often quietly notifies the website owner. But word can get out, leaving the website's customers feeling betrayed, and seriously damaging a brand's reputation.
Attackers, often organised crime rings, gain entry using techniques such as cross-site scripting, SQL injection and remote file-inclusion attacks, then install malicious code on the web server that lets them get access to the end users doing business with the site.
"They're co-opting machines that can be part of botnets that send phishing email, that are landing sites for traffic diversion and that host malware," says Frederick Felman, chief marketing officer at MarkMonitor. But because the business's website isn't directly affected, the administrators of most infected websites don't even know it's happening.
That possibility is one of Lynn Goodendorf's biggest worries as global head of data privacy at InterContinental Hotels Group. "I worry about attacks that use a combination of malware and botnets," she says, adding that she has watched this type of activity increase steadily over the past two years. "That's very scary," says Goodendorf.
Most victims haven't associated such attacks with the Web sites that inadvertently infected them. But that may be changing.
The latest versions of Microsoft's Internet Explorer browser and Google's search engine detect sites infected with malware, issue a warning and block access to the site. "To me, this is serious online brand damage," says Garter analyst John Pescatore, and it can be disastrous for small and midsize businesses that totally depend on search engine traffic. The next frontier, says Dye, may be attackers who use these types of exploits against the Web sites of high-profile brands and then publicize — or threaten to publicise — what happened.
Preventing attacks like SQL injections requires using enterprise-class security tools, such as intrusion-prevention and -detection systems, with a focus on behavioural analysis to spot attacks, Dye says. But Pescatore sees a more fundamental problem: rushing through Web site updates and ignoring development best practices designed promote security.
Most organisations follow formal processes for major upgrades, but not for the constant "tinkering" that takes place. The result: Vulnerabilities creep into the code. "Security groups often are forced to put web application firewalls in front of web servers to shield [these] vulnerabilities from attack," says Pescatore.