News Stay informed about the latest enterprise technology news and product updates.

Super Bowl Trojan infects dozens of sites

From Dolphin Stadium's site, Trojan spread to more than 50 others, leaving unknown numbers of PCs and other sites infected.

One high-profile Trojan has proliferated across dozens of Web sites following the infection Friday of the Web site for Dolphin Stadium in Miami.

The security service at Websense Inc. in San Diego discovered the Dolphin Stadium hack Feb. 2; over the weekend the SANS Internet Storm Center (ISC) in Bethesda, Md. found that at least 50 other sites had also been infected by a JavaScript keylogger.

The file was injected into the header of each site, executing and attempting to download a Trojan to the PC of anyone visiting the site. The Trojan attempted to exploit two known Windows vulnerabilities.

Experts at McAfee Inc. said the script and Trojan weren't sophisticated, but that placing it on the Dolphins Stadium site the weekend of the Super Bowl was extremely effective at spreading the malware.

The chief researcher at SANS ISC said all the high-profile sites had been fixed and posed no danger to visitors; managers of several of the sites couldn't confirm whether they'd been infected, however, and others did not return calls.

The original version of this story appeared on TechTarget sister site

Dig Deeper on Cybersecurity risk assessment and management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.