Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - "Printer Bomb" Malware Spread Via Compromised .htaccess Files-> 2

Submitted by wiredmikey
wiredmikey (1824622) writes "In late June, security researchers discovered malware that had been launching junk print jobs that waste paper until the printer runs out. Symantec calls the printer malware Milicenso, or the “Printer Bomb”, and code examination marks it as a variant of a malware delivery system discovered in 2010.

Today, after conducting additional research on Trojan.Milicenso, researchers determined that the threat is propagated by a compromised .htaccess file that launches a redirection Web attack. So far, Symantec has been able to count at least 4,000 websites that have been compromised by the cybercriminal(s) behind the attacks.

Research shows that the attack dated back to at least 2010, and the attacker(s) used different domain names to prevent them from being blocked or blacklisted. According to Symantec, “In 2010 and 2011, the gang moved to a new domain every few months. But in 2012, they changed domains almost every day.""

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

"Printer Bomb" Malware Spread Via Compromised .htaccess Files

Comments Filter:

"You know, we've won awards for this crap." -- David Letterman

Working...