Sony PlayStation's site SQL injected, redirecting to rogue security software

From Botnets.fr
Revision as of 16:22, 7 February 2015 by Eric.freyssinet (talk | contribs) (1 revision imported)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Sony PlayStation's site SQL injected, redirecting to rogue security software
Sony playstation sql injected.jpg
Botnet Asprox
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2008 /
Editor/Conference Zdnet
Link http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394 www.zdnet.com (www.zdnet.com Archive copy)
Author Dancho Danchev
Type

Abstract

The latest high trafficked web site to fall victim into the continuing waves of massive SQL injection attacks courtesy of copycats and the ASProx botnet, is Sony’s PlayStation U.S site according to a recent post at SophosLabs’s blog :

“Researchers at IT security firm Sophos have warned lovers of video games that pages on the US-based Sony PlayStation website have been compromised by hackers. Experts at SophosLabs have discovered that cybercriminals have successfully used an SQL injection attack to plant unauthorized code on pages promoting the PlayStation games “SingStar Pop” and “God of War”.

Bibtex

 @misc{Danchev2008BFR805,
   editor = {Zdnet},
   author = {Dancho Danchev},
   title = {Sony PlayStation's site SQL injected, redirecting to rogue security software},
   date = {23},
   month = Oct,
   year = {2008},
   howpublished = {\url{http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394 www.zdnet.com}},
 }