Lizamoon hits thousands of websites, but claims few victims


Lizamoon hits thousands of websites, but claims few victims

Warwick Ashford

The Lizamoon mass SQL injection attack in which rogue code was injected into thousands of legitimate sites to lure users to malicious sites has claimed few victims.

Links to a fake virus scan that recommended fake security software on and 27 other domains were injected into up to 4m web pages between 29 March and 3 April.

Despite the widespread success of the SQL injection attacks, swift action by security firms has limited the number of victims, according to the BBC.

Security researchers believe only a small number of people followed the link and bought the fake software because the domains set up for the scam were shut down quickly and the sites compromised by attack were relatively low profile.

This is a SQL-injection attack, emphasises Jim Walter, manager of the McAfee Threat Intelligence Service.

"Before any of us blow our IT budgets on database security goodies, we must all take the basic first steps," he says in a blog post.

Walter recommends simple and core techniques, such as constraining user input, validating user input, limiting types of input, encrypting sensitive data, and designing accounts with the principle of least privilege.

Lessons learned from Conflicker. Click to download this report. (Requires registration)

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy