Ongoing malware attack targeting Apache hijacks 20,000 sites


New Member
Tens of thousands of websites, some operated by The Los Angeles Times, Seagate, and other reputable companies, have recently come under the spell of "Darkleech," a mysterious exploitation toolkit that exposes visitors to potent malware attacks.

The ongoing attacks, estimated to have infected 20,000 websites in the past few weeks alone, are significant because of their success in targeting Apache, by far the Internet's most popular Web server software. Once it takes hold, Darkleech injects invisible code into webpages, which in turn surreptitiously opens a connection that exposes visitors to malicious third-party websites, researchers said. Although the attacks have been active since at least August, no one has been able to positively identify the weakness attackers are using to commandeer the Apache-based machines. Vulnerabilities in Plesk, Cpanel, or other software used to administer websites is one possibility, but researchers aren't ruling out the possibility of password cracking, social engineering, or attacks that exploit unknown bugs in frequently used applications and OSes.

Researchers also don't know precisely how many sites have been infected by Darkleech. The server malware employs a sophisticated array of conditions to determine when to inject malicious links into the webpages shown to end users. Visitors using IP addresses belonging to security and hosting firms are passed over, as are people who have recently been attacked or who don't access the pages from specific search queries. The ability of Darkleech to inject unique links on the fly is also hindering research into the elusive infection toolkit.

"Given that these are dynamically generated, there would be no viable means to do a search to ferret them out on Google, etc.," Mary Landesman a senior security researcher for Cisco Systems' TRAC team, told Ars. "Unfortunately, the nature of the compromise coupled with the sophisticated conditional criteria presents several challenges."

The injected HTML iframe tag is usually constructed as IP address/hex/q.php. Sites that deliver such iframes that aren't visible within the HTML source are likely compromised by Darkleech. Special "regular expression" searches such as this one helped Landesman ferret out reported iframes used in these attacks. Note that while the iframe reference is formed as IP/hex/q.php, the malware delivery is formed as IP/hex/hex/q.php.
Read the original article here:


New Member
Verified Provider
I don't understand what hackers get out of this kind of activity...  It's not like they're paid or praised...


Article Submitter
Verified Provider
Depending on that attack and the sites in question it could be anything from stealing personal information to making a political statement. You have to remember they only have a few ways to voice themselves DDOS, malware, phishing, virus, are just some ways that they cause disruption to our world. Don't forget that the governments in other nation including the USA uses hackers to steal information and prevent attacks or cause them for reason unknown to us and depending on how they get caught either a hacker group takes the blame or the blame is pass onto them.


Verified Provider
I don't understand what hackers get out of this kind of activity... It's not like they're paid or praised...
Many of those communities actually have awards and trophy programs, so to speak, kinda like if you're a Ham and win a WAS or QRP award for your QSLs.
Last edited by a moderator: