Careers & Certifications

06:44 PM
Connect Directly
RSS
E-Mail
50%
50%

Ad Banner Attack Involved Comedy Central

More details come to light about the weekend attack that compromised a German Web advertising company's server and infected users who visited Web sites run by the firm's clients with

More details came to light Tuesday about the weekend attack that compromised a German Web advertising company's server and infected users who visited Web sites run by the firm's clients with the MyDoom/Bofra worm.

According to a statement released last Monday night by Falk eSolutions, the attack began early Saturday morning when an attacker managed to infiltrate the server and place code that redirected ad requests to a third-party site.

That site was http://search.comedycentral.com, which had also been compromised by the attacker. Neither Falk nor the SANS Institute's Internet Storm Center, which tracked and helped investigate the attack, have any idea when Comedy Central's site has cracked. As of mid-morning Tuesday, Comedy Central's search site was offline.

"It looks like Comedy Central and perhaps some other sites were compromised first, followed by Falk. Then, Falk's site was configured to redirect visitors to Comedy Central," said Marcus Sachs, the director of the Storm Center, in a statement.

Falk continued to play down the extent of the problem, saying potential redirects to the exploit code on the Comedy Central server were less then 2 percent of the ad requests from European client sites, and under 0.1 percent of those from U.S. clients during the six-hour span of the attack.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed