A week after Web hosting company Network Solutions dealt with a large-scale infection of WordPress-driven blogs, the company acknowledged that other sites it hosts have been compromised.
"We have received reports that Network Solutions customers are seeing malicious code added to their websites and we are really sorry for this experience," said company spokesman Shashi Bellamkonda in a Sunday blog post . "At this time, since anything we say in public may help the perpetrators, we are unable to provide details."
On Monday, another Network Solutions spokesperson declined to get more specific or answer questions, including what moves the company was making and how many sites had been affected. "At this time, we believe this is affecting a subset of our hosting customers," said Susan Wade, the director of Network Solutions' corporate communications. "For now, it's difficult to make a conclusive statement or provide more details publicly."
According to the StopMalvertising blog , the attacks planted a rogue IFRAME on the hacked sites to shunt users to the attack server. That server then launches multiple exploits, including an attack kit of ActiveX exploits and three more leveraging Adobe Reader vulnerabilities, against visiting PCs.
Several browsers , including Microsoft's Internet Explorer 8 (IE8), Google's Chrome and Mozilla's Firefox, display warnings when users are redirected to the attack site. "This web page ... has been reported as an attack page and has been blocked based on your security preferences," Firefox reports in its warning.
Network Solutions had characterized the earlier attacks targeting WordPress-crafted blogs as a file permissions issue, and initially seemed to blame users' weak passwords for the attacks. Although the company never disclosed how the blogs were hacked, it said it had addressed what it called the "root cause" by April 11.
Yesterday, Bellamkonda hinted that the newest attacks were conducted differently than those against WordPress blogs hosted by his company. "It may not be accurate to categorize this as a single issue such as 'file permissions,'" he said. He also said that passwords were "not related to this issue."
Network Solutions declined to say today whether it had figured out how the second wave of attacks was carried out. "Our teams continue to work around the clock to combat this threat to us and our customers. We are also continuing to actively investigate the issue," said Wade.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld . Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com .
Read more about security in Computerworld's Security Knowledge Center.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.