TechTarget

Hacked Super Bowl stadium site delivered malware

Discovered dasy bnefore the event and now reportedly resolved, a malicious Javascript file exploited two known Microsoft flaws.

This Article Covers

Data centre

A security firm reported on 2 February that digital miscreants successfully compromised the Web site of Miami's Dolphin Stadium, home of Sunday's Super Bowl XLI, potentially endangering the site's visitors.

The incident, discovered by San Diego-based Websense Inc.'s Security Labs unit, involved a link to a malicious Javascript file that had been inserted into the header of the front page of the site, with the intent of propagating malicious code on visitors' computers.

"Visitors to the site execute the script, which attempts to exploit two vulnerabilities: MS06-014 and MS07-004," according to a bulletin from Websense. "Both of these exploits attempt to download and execute a malicious file."

According to published reports, Dolphin Stadium representatives have confirmed that the site was compromised, but said the issue had been addressed and that the Web site no longer poses a threat. However, Websense said, the initial breach may have occurred more than a week ago.

The Web site is currently experiencing higher-than-normal traffic because of Sunday's event.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

This Content Component encountered an error

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close