Difference between revisions of "Sony PlayStation's site SQL injected, redirecting to rogue security software"

From Botnets.fr
Jump to navigation Jump to search
 
m (1 revision imported)
 
(No difference)

Latest revision as of 15:22, 7 February 2015

(Publication) Google search: [1]

Sony PlayStation's site SQL injected, redirecting to rogue security software
Sony playstation sql injected.jpg
Botnet Asprox
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2008 /
Editor/Conference Zdnet
Link http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394 www.zdnet.com (www.zdnet.com Archive copy)
Author Dancho Danchev
Type

Abstract

The latest high trafficked web site to fall victim into the continuing waves of massive SQL injection attacks courtesy of copycats and the ASProx botnet, is Sony’s PlayStation U.S site according to a recent post at SophosLabs’s blog :

“Researchers at IT security firm Sophos have warned lovers of video games that pages on the US-based Sony PlayStation website have been compromised by hackers. Experts at SophosLabs have discovered that cybercriminals have successfully used an SQL injection attack to plant unauthorized code on pages promoting the PlayStation games “SingStar Pop” and “God of War”.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2008BFR805,
   editor = {Zdnet},
   author = {Dancho Danchev},
   title = {Sony PlayStation's site SQL injected, redirecting to rogue security software},
   date = {29},
   month = Mar,
   year = {2008},
   howpublished = {\url{http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394 www.zdnet.com}},
 }