A reported IFRAME attack that was being used to infect visitors with a multi-exploit attack kit led Monster.com to take a portion of its Web site offline Monday.
According to Internet records, the Russian Business Network (RBN) hacker network may be involved.
Parts of the Monster Company Boulevard, which lets job hunters search for positions by company, were unavailable Monday; by evening, the entire section was dark. Most major American companies are represented on the site — Google Inc.’s cache of the page that shows only those firms which begin with the letter “B”, for example, included Banana Republic, Bank of America, Black & Decker, Boeing, Broadcom and Budget Car Rental.
Job seekers who used Monster’s by-company directory on Monday before the site was yanked were pounced on by Neosploit, an attack toolkit similar to the better-known Mpack, said Roger Thompson, chief technology officer at Exploit Prevention Labs Inc.
“A typical infective URL was http://company.monster.com/toyfs/, which is Toyota Financial[‘s section],” said Thompson in an instant-message exchange Monday night. “Or http://company.monster.com/bestbuy, which is Best Buy’s.”
The injection of the malicious IFRAME code into the Monster.com site probably happened Monday, he added. “It was interesting that we got five or so hits in the space of a few hours today, but none before that. I think it happened today.”
Like many other IFRAME exploits, this one silently redirected the user’s browser to another site hosting Neosploit. In the case of at least one of the exploit sites Thompson identified, there’s a connection to the notorious Russian Business Network (RBN), the hacker and malware hosting network that recently shifted operations to China, then mysteriously abandoned the IP blocks it had acquired in China, seemingly vanishing from the Internet.
The IP address of the exploit site is assigned to a server in Australia which is part of the “myrdns.com” domain. That domain, in turn, is registered to a Hong Kong ISP called HostFresh Internet. Both HostFresh and myrdns.com have been linked to RBN activities, including the long-running IFRAME Cash scheme, in which RBN pays small site owners a commission for injecting IFRAME exploits on other sites.
According to an anonymous blogger who tracks the RBN, other myrdsn.com/HostFresh IP addresses were involved in the Bank of India hack in August.
Thompson said he had just started digging into the Monster.com hack on Monday afternoon. “It is not clear how many pages were affected, but it is likely that the attack was the same for all companies on the site, which might turn out to be a pretty good set of the Fortune 500,” he said on his blog.
The Maynard, Mass.-based Monster.com last made security news in August, when the company admitted hackers had looted its database for weeks, perhaps months, then used that information to craft and send targeted e-mails that pitched money laundering jobs or tried to trick recipients into downloading malware.
Monster.com was not available for comment Monday night.