SCCyberworld

Thursday, July 3, 2008

Visitors to Sony PlayStation website at risk of malware infection, Sophos reports

Hackers use SQL injection and scare tactics to grab consumers' credit card details

Singapore. July 3, 2008 – Researchers at IT security firm Sophos have warned lovers of video games that pages on the US-based Sony PlayStation website have been compromised by hackers.

Experts at SophosLabs™ have discovered that cybercriminals have successfully used an SQL injection attack to plant unauthorised code on pages promoting the PlayStation games “SingStar Pop” and “God of War”.

At the time of writing the hacker's code attempts to dupe web surfers by running a fake anti-virus scan and displaying a bogus message that their computer is infected with a variety of different viruses and Trojan horses.

The hackers’ aim is to scare unsuspecting computer users into purchasing a bogus security product. Sophos warns, however, that it would be trivial for the hackers who have compromised the webpages to alter the payload so that it became more malicious, and installed code designed to turn Windows PCs into a botnet or to harvest confidential information from users.

“There are millions of video game lovers around the world, many of whom will visit Sony's PlayStation website regularly to find out more about the latest console games. Most would never expect that surfing to a website like this could potentially infect them with malware. If users do not have sufficient protection in place then they might find that before they know it they have been scared into handing their credit card details over to a bunch of cybercriminals,” said Graham Cluley, senior technology consultant for Sophos. “It is essential that all websites, especially when they are high profile like this or receiving a large level of traffic, have been properly hardened to prevent hackers from injecting malicious code on to what should be legitimate webpages.”

Sophos customers are automatically protected against the threats (which Sophos identities as Troj/Iframe-AG and Mal/Badsrc), and users of other vendors' products are advised to update their software.

Learn more details about the attack on the Sony PlayStation website on the SophosLabs blog: http://www.sophos.com/security/blog/2008/07/1540.html

SophosLabs have informed Sony of the problem on their website, which at the time of writing is still present.

No comments: