NBC.com hacked to serve up banking malware

NBC said it was working to clear up the issues, which also affected some of its other websites
  • Jeremy Kirk (IDG News Service)
  • — 22 February, 2013 00:42

Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details.

On its own technology blog, NBC released a statement saying, "We've identified the problem and are working to resolve it. No user information has been compromised."

Sites such as NBC.com are a frequent target for hackers since the high volume of visitors offers a chance to infect many people in a short period of time.

Several computer security companies said the main NBC.com website had been modified to serve up an iframe, which is a way to load content into a website from another domain.

The iframe loaded an exploit kit called Redkit, which tries to see if a visitor is running unpatched software, according to a blog post from Securi, a computer security company based in Menifee, California. The style of attack is known as a drive-by download and can infect a computer when a user merely views a website.

NBC.com was temporarily blacklisted by Google after the attack. Facebook also stopped directing users to NBC.com. Securi wrote that other NBC sites, including ones for TV talk show hosts Jimmy Fallon and Jay Leno, were also affected.

The hack follows the release of a report this week from security vendor Mandiant about a long-running hacking campaign allegedly based in Shanghai that targeted U.S. corporations, although it did not immediately appear connected with the problems at NBC.com.

Another computer security firm, SurfRight, wrote on its HitmanPro blog that the NBC attack loaded exploits that look for vulnerabilities in Oracle's Java programming framework and Adobe's PDF products. Oracle and Adobe have both released critical updates for their products this month, but hackers hope to hit users who have not updated their computers.

If the attack is successful, one of two malicious software programs is delivered, called Citadel or ZeroAccess. Citadel is a trojan designed to collect account credentials for banks including Bank of America, Wells Fargo, Chase and others, according to Fox-IT, a Dutch computer forensics company.

The version of Citadel analyzed by Fox-IT showed it was being detected by only three of 46 products on VirusTotal, a website where malicious software can be tested for detection against many of the popular security suites.

According to Symantec, ZeroAccess is an advanced rootkit, or a piece of malicious software that hides at a low level in a computer's operating system. ZeroAccess, detected by Symantec in July 2011, can create its own hidden file system and download other malware to a computer.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: intrusion, security, NBC.com, Exploits / vulnerabilities, malware

While Heartbleed distracts, hackers hit US universities

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot Web Security

Proactive web security that blocks threats in the cloud before they reach users’ machines, or enter customers’ networks.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.