Hacked used to serve Windows malware

Open-source software provider cleans up infection but back doors may remain, Armorize says.

This screenshot is from the Armorize video created to show exactly how a visitor to was infected before the infection was cleaned up.
This screenshot is from the Armorize video created to show exactly how a visitor to was infected before the infection was cleaned up. Armorize

The MySQL site, whose open-source repository serves some of the most popular Web sites, has been hacked and was being used to serve malware to visitors running Windows before it was cleaned up today, a security firm said.

Armorize Chief Executive Wayne Huang and some of his firm's researchers warned about the attack in a blog post today. acted quickly to remove the malware so computers would stop getting infected, but Huang told CNET he did not know how long site visitors were vulnerable or how many may have been infected. Armorize estimated that gets more than 100,000 page views a day and more than 34,000 unique daily visitors.

"The infection rate tends to be high for these types of attacks," he said. "They handled it very quickly but that doesn't mean they cleaned up the backdoors the attackers left" on the site.

Huang said he did not know how dangerous an infection would be to a computer that was hit with one, except to say that the malware would be very difficult to clean up and would still be running on the machine even after a reboot.

"We haven't gone in depth in analyzing what this particular piece of malware does," he said. "We know it changes some of your Windows .dlls (Dynamic-link libraries), probably to make sure it is permanently installed and running all the time. You may be able to clean it up, but it won't be a trivial process." representatives could not be reached for comment this afternoon. Representatives from Oracle, which owns, did not immediately respond to e-mails and calls seeking comment.

Before the infection was removed, the compromise redirected traffic to a BlackHole exploit pack that forces the browser to install a piece of malware on the machine, according to the Armorize Malware Blog.

"It exploits the visitor's browsing platform (the browser, the browser plugins like Adobe Flash, Adobe PDF, etc, Java,...), and upon successful exploitation, permanently installs a piece of malware into the visitor's machine, without the visitor's knowledge," the blog says. "The visitor doesn't need to click or agree to anything; simply visiting with a vulnerable browsing platform will result in an infection."

The Armorize blog also has a video showing how a visitor's machine could have gotten infected from the site. Only 4 out of 44 vendors on VirusTotal site can detect the malware, Armorize said.

Meanwhile, Brian Krebs of the Krebs on Security blog said he had noticed someone selling administrative access to on an exclusive Russian underground hacker forum a few days ago for $3,000.

"i think it's very likely that it's related, esp with these Russian forums," said Huang.