Asus.com hacked, serving up .ANI exploits

Summary:The official Web site of Asustek Computer has been hijacked and used to serve up exploit code for the recently-patched animated cursor (.ani) vulnerability.

The official Web site of Asustek Computer has been hijacked and used to serve up exploit code for the recently-patched animated cursor (.ani) vulnerability.


  Photo Gallery: Catch a glimpse of the animated cursor exploit in action. The image gallery includes screenshots of rigged sites and an exploit timeline that shows the rapid escalation of the attacks.  

An embedded iFrame HTML element was planted on the Asus.com site (currently offline) and used to point visitors to other malicious sites hosting the ANI exploit code.

The Asus.com hijack was first reported on Dynamoo's Blog and verified by Kaspersky Lab's Roel Schouwenberg.

Asustek Computer, a well-known mother board manufacturer, also produces cell phones, desktop and notebook computers, graphics cards, optical drives, servers, and networking devices.

This is not the first malware-related site breach affecting Asus.com. Last December, the site was launching drive-by downloads of password-stealing spyware programs on unsuspecting surfers.

Asustek officials could not be reached for comment.

Topics: Browser

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.