Weekly Footprints of Threats
  • Phishing : 209961
  • Malware : 751231
  • Ransomware : 6587
  • Executable : 675391

Related Articles


  1. 1


    Thank you..really informative!!

    Like or Dislike: Thumb up 0 Thumb down 0

  2. 2


    Where exactly is the facebook like button ?

    Like or Dislike: Thumb up 0 Thumb down 0

  3. 3


    hi, superb blog site, and a very good understand! at least one for my bookmarking.

    Like or Dislike: Thumb up 0 Thumb down 0

  4. 4


    Good to see that some people really write good content nowadays. Offtopic: I don’t know why but i’m having javascript errors viewing your website on Internet Explorer.. can you check it please? Best Regards

    Like or Dislike: Thumb up 0 Thumb down 0

  5. 5

    Stanford Thall

    I really like what you post here. Very insightful and intelligent. One problem though. I’m running Opera with Debian and parts of your current layout pieces are a little wonky. I realize it’s not a typical set up. Yet it’s something to keep in mind. I hope that it will help and continue to keep up the top quality writing.

    Like or Dislike: Thumb up 0 Thumb down 0

    1. 5.1

      R Sachin


      Your query has been forwarded. we will check it out.

      Sachin R

      Like or Dislike: Thumb up 0 Thumb down 0

  6. 6

    botox Kraków

    I quite enjoy what you submit right here. Particularly insightful and intelligent. One concern though. I’m running Firefox with Debian and parts of your current web design pieces are a little wonky. I realize it’s not a popular set up. But it’s an issue to hold in the mind. I wish that it will probably help and keep the top rated quality writing.

    Like or Dislike: Thumb up 0 Thumb down 0

    1. 6.1

      R Sachin


      We are looking into this . hopefully the issue will be resolved before the next blog is published.

      Sachin R

      Like or Dislike: Thumb up 0 Thumb down 0

  7. 7


    Interesting blog.

    It seems like the attack happens in two separate steps:

    1. Get table and column structure
    The attacker visits and get information on the table and column structure of the database with the following (as I picked up from the IIS log files on a site I have that got infected – Windows 2008, IIS7 and SQL Server 2008):

    2011-04-09 22:49:17 myserverip GET /ViewProduct.aspx
    80 – Mozilla/4.0+(compatible;+Synapse) 500 0 0 519 …lots
    of these

    so from the information_schema.tables view it gets the table names.

    Then it gets the column names as follows:

    2011-04-09 22:49:28 myserverip GET /ViewProduct.aspx
    80 – Mozilla/4.0+(compatible;+Synapse) 500 0 0 785 …
    lots of these as well

    from the information_schema.columns view

    2. Malicious table update
    A few days later other visits happen. As the attacker now has the database structure – he can be very specific and update Description columns with the junk.

    2011-04-19 15:32:58 myserverip GET /products.aspx
    80 –

    Hope it helps someone

    Like or Dislike: Thumb up 0 Thumb down 0

Comments are closed.

Copyright © 2018 MicroWorld Technologies Inc. - Anti-Virus escanav.com