Super Bowl Trojan infects dozens of sites

One high-profile Trojan has proliferated across dozens of Web sites following the infection Friday of the Web site for Dolphin

    Requires Free Membership to View

Stadium in Miami.

The security service at Websense Inc. in San Diego discovered the Dolphin Stadium hack Feb. 2; over the weekend the SANS Internet Storm Center (ISC) in Bethesda, Md. found that at least 50 other sites had also been infected by a JavaScript keylogger.

The file was injected into the header of each site, executing and attempting to download a Trojan to the PC of anyone visiting the site. The Trojan attempted to exploit two known Windows vulnerabilities.

Experts at McAfee Inc. said the script and Trojan weren't sophisticated, but that placing it on the Dolphins Stadium site the weekend of the Super Bowl was extremely effective at spreading the malware.

The chief researcher at SANS ISC said all the high-profile sites had been fixed and posed no danger to visitors; managers of several of the sites couldn't confirm whether they'd been infected, however, and others did not return calls.

The original version of this story appeared on TechTarget sister site

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: