Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.
All the affected servers were running the 2.6 version, first released in December 2003, of the Linux kernel, which is the core of the operating system. Most were running a 2.6 Linux kernel version released in 2007 or earlier, wrote Martin Lee, technical lead of Threat Intelligence for Cisco.
[ Also on InfoWorld: Researchers discover credential-stealing Unix-based server botnet. | Prove your expertise with the free OS in InfoWorld's Linux admin IQ test round 1 and round 2. | Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
"Systems that are unmaintained or unsupported are no longer patched with security updates," Lee wrote. "When attackers discover a vulnerability in the system, they can exploit it at their whim without fear of it being remedied."
"The two-stage process allows attackers to serve up a variety of malicious content to the visitor," Lee wrote.
The visitor is then served pay-per-view fraud pages, which load up advertisements. Other clues indicate some visitors may be served malicious software, he wrote.
One in 15 of Cisco's clients using its Cloud Web Security product had one of their users attempt to request one of the malicious URLs, Lee wrote. The company saw 400 distinct hosts, with a high number in the U.S. and Germany, affected on March 17 and 18, showing "the spread of this attack has been dramatic," he wrote.
About 2,700 URLs have been affected. Because the attack centers on compromising legitimate websites, "security awareness campaigns that train users to be wary of unknown websites may not be effective against trusted websites that become compromised to serve malware," Lee wrote.
The campaign highlights the need for system administrators to continually update their systems.
"Large numbers of vulnerable unpatched systems on the Internet are tempting targets for attackers," Lee wrote. "Such systems can be used as disposable one-shot platforms for launching attacks."
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk