Hacked Super Bowl stadium site delivered malware


Hacked Super Bowl stadium site delivered malware

Eric B. Parizo, Site Editor
A security firm reported on 2 February that digital miscreants successfully compromised the Web site of Miami's Dolphin Stadium, home of Sunday's Super Bowl XLI, potentially endangering the site's visitors.

The incident, discovered by San Diego-based Websense Inc.'s Security Labs unit, involved a link to a malicious Javascript file that had been inserted into the header of the front page of the site, with the intent of propagating malicious code on visitors' computers.

"Visitors to the site execute the script, which attempts to exploit two vulnerabilities: MS06-014 and MS07-004," according to a bulletin from Websense. "Both of these exploits attempt to download and execute a malicious file."

According to published reports, Dolphin Stadium representatives have confirmed that the site was compromised, but said the issue had been addressed and that the Web site no longer poses a threat. However, Websense said, the initial breach may have occurred more than a week ago.

The Web site is currently experiencing higher-than-normal traffic because of Sunday's event.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy