Author Topic: HTML:Script-inf  (Read 4640 times)

0 Members and 2 Guests are viewing this topic.

rwillen

  • Guest
HTML:Script-inf
« on: August 13, 2009, 04:36:33 PM »
Hi,

My wife got this warning last night at the following webpage:

hxxp://www.sultan.k12.wa.us/ssd/ssd.cfm?id=166

I'd like to know what set the alert off so I can let the school district know if there may be an issue.

Thanks!
« Last Edit: August 14, 2009, 06:40:07 PM by rwillen »

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89690
  • No support PMs thanks
Re: HTML:Script-inf
« Reply #1 on: August 13, 2009, 05:22:36 PM »
There is a script tag after the closing HTML tag (a standards no, no) on that page, it points to hXXp://wXw.afkartech.com/images/logo.swf; this domain is in Riyadh, Saudi Arabia, so I don't know why it would be on your school site.

Whilst this says it is a Shock Wave Flash (.swf) file, purporting to be a logo, it could actually be anything.

This also seems to be the case for the favicon.ico file as that seems to have been modified as it is the same as the ssd.cfm page of the original alert.

It could be that the CFM content management software could be being exploited and this script tage inserted when the page is compiled.

Please 'modify' your post change the URL from http to hXXp or www to wXw, to break the link and avoid accidental exposure to suspect sites, thanks.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: HTML:Script-inf
« Reply #2 on: August 13, 2009, 05:44:57 PM »
Hi rwillen,

Of 273 pages that were tested dusring the previous 90 days on mentioned site, 28 pages have been downlaoding and installing malicious software without user's consent. The last time malware was found there, was 2009-07-14.
Malicious software includes 53 scripting exploits, 53 trojans, 50 exploits.

Malious software has been hosted on 4 domains, e.g. afkartech.com/, hi2i.cn/, kan31ni.cn/.

1 domain seemed to function as a redirecting site in spreading malware to visitors of the site, e.g. afkartech.com/.

This site was hosted on 1 network(s) including AS10430 (WA).

Now what about afkartach.com a suspicious site:
The last timesuspicious content has been found up there was on 2009-08-13.
Malicious software includes 1736 trojans, 551 scripting exploits.

Malicious software has been hosted on 1 domain, e.g. yrwap.cn/.

This site was hosted on 3 network(s) including AS26496 (PAH), AS13867 (CNET), AS15657 (SPEEDBONE).

It seems afkartech.com has been functioning as a malware spreading site to infect 26 sites, e.g. itspawsible.com/, rodeodrive.travel/, northforkluxury.com/.

This site has been hosting maware and infected 210 domains, e.g. nade-nade.net/, allspaces.com/, thomasjmccarthy.com/.

How this happened has been explained by DavidR, by adding malcode to real sites, making that we issue above warnings,

polonus
« Last Edit: August 13, 2009, 05:46:54 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

rwillen

  • Guest
Re: HTML:Script-inf
« Reply #3 on: August 14, 2009, 06:47:37 PM »
Thank you both. I've modified my post, sorry about that I wasn't thinking I guess.

Would you mind showing me how you found that tag? I looked at the page source and didn't see it.

Thanks again.

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89690
  • No support PMs thanks
Re: HTML:Script-inf
« Reply #4 on: August 14, 2009, 07:21:36 PM »
You may not find it in the page source as it is likely to be that when the actual page is complied the tag is inserted into the page as I said this is exploiting of vulnerabilities in content management software.

We were looking at the source as it is seen on-line, if you aren't viewing that but the physical sorce before the page is compiled you are unlikely to see anything.

So it is the CFM software that you need to check is fully up to date, closing any security vulnerabilities.

This is supposition as if you don't see the tag on source pages, but it exists on the physical page displayed something has to be injecting the code into the page and this is usually content management software being exploited.

Presumably this domain hXXp://wXw.afkartech.com/images/logo.swf is unknown to the school, e.g. no affiliation, etc. so there would be no legitimate reason for it to be there ?
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

rwillen

  • Guest
Re: HTML:Script-inf
« Reply #5 on: August 14, 2009, 11:03:50 PM »
You may not find it in the page source as it is likely to be that when the actual page is complied the tag is inserted into the page as I said this is exploiting of vulnerabilities in content management software.

We were looking at the source as it is seen on-line, if you aren't viewing that but the physical sorce before the page is compiled you are unlikely to see anything.

So it is the CFM software that you need to check is fully up to date, closing any security vulnerabilities.

This is supposition as if you don't see the tag on source pages, but it exists on the physical page displayed something has to be injecting the code into the page and this is usually content management software being exploited.

Presumably this domain hXXp://wXw.afkartech.com/images/logo.swf is unknown to the school, e.g. no affiliation, etc. so there would be no legitimate reason for it to be there ?

Thank you David. I'll talk to the admin of the school district.

Online DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89690
  • No support PMs thanks
Re: HTML:Script-inf
« Reply #6 on: August 14, 2009, 11:08:44 PM »
You're welcome, good luck.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security