Hacked Super Bowl stadium site delivered malware
Discovered dasy bnefore the event and now reportedly resolved, a malicious Javascript file exploited two known Microsoft flaws.
The incident, discovered by San Diego-based Websense Inc.'s Security Labs unit, involved a link to a malicious Javascript file that had been inserted into the header of the front page of the site, with the intent of propagating malicious code on visitors' computers.



UK IT Priorities 2018 survey results
Download this e-guide to discover the results of our 2018 UK IT Priorities survey, where IT leaders shared with us what they are going to be investing in over the coming 12 months.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
"Visitors to the site execute the script, which attempts to exploit two vulnerabilities: MS06-014 and MS07-004," according to a bulletin from Websense. "Both of these exploits attempt to download and execute a malicious file."
According to published reports, Dolphin Stadium representatives have confirmed that the site was compromised, but said the issue had been addressed and that the Web site no longer poses a threat. However, Websense said, the initial breach may have occurred more than a week ago.
The Web site is currently experiencing higher-than-normal traffic because of Sunday's event.
Start the conversation
0 comments