Hackers are in charge of a database containing more than 8,700 harvested FTP account credentials, including username, password and server addresses, revealed secure web gateway products provider Finjan in its latest Malicious Page of the Month report.
These stolen credentials enable criminals to compromise servers and automatically inject crimeware to infect users visiting them, says the security vendor.
They are using the NeoSploit 2 Crimeware toolkit for this purpose, the report notes.
According to Finjan, some of these stolen accounts belong to the Fortune-level global companies in a wide range of industries including manufacturing, telecom, media, online retail, IT, as well as government agencies. The stolen accounts include some of the world's top 100 domains as ranked by Alexa.com.
Hackers are not only in possession of such significant information, they are also engaged in its trading, claims Finjan's Malicious Code Research Center (MCRC), a department that researches security vulnerabilities in internet applications.
MCRC has detailed the workings of an insidious new application, especially designed to abuse and trade stolen FTP account credentials of legitimate companies around the world. A trading interface is used to qualify the stolen accounts in terms of country of residence of the FTP server and Google page ranking of the compromised server, MCRC says.
According to MCRC, this information enables the cybercriminals to devise cost for the compromised FTP credentials for resale to other cybercriminals or to adjust the attack on more prominent sites.
"With this new trading application, cybercriminals have an instant 'solution' to their 'problem' of gaining access to FTP credentials and thus infecting both the legitimate websites and its unsuspecting visitors," says Yuval Ben-Itzhak, CTO of Finjan.
The company has invited IT security personnel from legitimate organisations to inquire if their FTP servers' credentials are among those identified as stolen. Finjan can be contacted at here.