A massive SQL-injection attack has compromised 380,000 URLs, according to Websense.
The security firm first noticed the attack on Tuesday. From then, the number of affected URLs has jumped from 28,000 to 380,000 and counting - making it one of the largest such campaigns Websense has seen.
That site is currently down, but Websense said in a blog post it was redirecting users to a fake antivirus site earlier in the week.
Websense listed several iTunes URLs as compromised with the injected code, but said Apple's system doesn't execute the code, so users are safe.
Indeed, the "bad guys" haven't yet done much with the attack, Websense noted.
“We have been monitoring the attack since it came out and noticed that the number of the compromised URLs is still increasing... Different payload sites, have started to be involved in addition to the original Lizamoon.com," said Carl Leonard, threat research manager at Websense Security Labs.
"The payload sites remain inactive at present although they could be ‘switched’ on at any time," he added. "We can only speculate as to what the bad guys are waiting for.”
This article originally appeared at pcpro.co.uk
Copyright © PC Pro, Dennis Publishing
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.