Evasive web attacks bypass security systems

Evasive internet attacks, where malware evades internet security systems, are a growing threat.

Evasive internet attacks, where malware evades internet security systems, are a growing threat.

Web security firm Finjan has published a report on the problem, which sees attacks designed to bypass signature-based and database-reliant security technology. 

Finjan said evasive attacks relied on various tactics. For instance, in order to minimise the malicious code’s window of exposure, website evasive attacks can keep track of actual IP addresses of visitors to a particular website or web page.

Using this information, the attackers restrict exposure to the malicious code to a single view from each unique IP address. This means that the second time a given IP address tries to access the malicious page, a benign page will be automatically displayed in its place.

All traces of the initial malicious page completely disappear. This tactic reduces the chance of the malware being detected by supplier security systems.

Another tactic is to pay owners of specific websites a fee for each user that is infected with malware that can be used to generate financial gain for the hackers.

Finjan also reports that an increasing number of legitimate websites are carrying advertising campaigns infected with malware.

Quite often, websites will automatically assume that the advertising they sold will be legitimate, but they forget or don’t care that the space sold could be sub-let, including to hackers.

Internet Explorer security learning guide >>

File infectors top malware charts >>

David Lacey’s security blog >>

Comment on this article: e-mail computer.weekly@rbi.co.uk




Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...