Super Bowl Trojan infects dozens of sites

From Dolphin Stadium's site, Trojan spread to more than 50 others, leaving unknown numbers of PCs and other sites infected.

One high-profile Trojan has proliferated across dozens of Web sites following the infection Friday of the Web site for Dolphin Stadium in Miami.

The security service at Websense Inc. in San Diego discovered the Dolphin Stadium hack Feb. 2; over the weekend the SANS Internet Storm Center (ISC) in Bethesda, Md. found that at least 50 other sites had also been infected by a JavaScript keylogger.

The file was injected into the header of each site, executing and attempting to download a Trojan to the PC of anyone visiting the site. The Trojan attempted to exploit two known Windows vulnerabilities.

Experts at McAfee Inc. said the script and Trojan weren't sophisticated, but that placing it on the Dolphins Stadium site the weekend of the Super Bowl was extremely effective at spreading the malware.

The chief researcher at SANS ISC said all the high-profile sites had been fixed and posed no danger to visitors; managers of several of the sites couldn't confirm whether they'd been infected, however, and others did not return calls.

The original version of this story appeared on TechTarget sister site SearchSecurity.com.

This Content Component encountered an error

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close