The attack exploits a vulnerability on the Yahoo Developers Blog
Bitdefender warns users that cybercriminals are trying to hijack their accounts by relying on a cross-site scripting (XSS) type of attack.It all starts with an email coming from a contact. The message doesn’t say much, except for “check out this page,” followed by a link.
The link appears to lead to a legitimate MSNBC news page. However, a closer look at the link, www.msnbc.msn.com-im9.net, reveals that MSNBC is just a subdomain of com-im9.net, a domain registered in Ukraine earlier this month.
This is possible because the Developers Blog utilizes a flawed version of WordPress which contains the CVE-2012-3414 vulnerability. WordPress has patched this particular security hole with version 3.3.2, but Yahoo! hasn’t updated its blog.
Once they gain access to the accounts, cybercriminals can steal contacts and use the harvested addresses to send out spam emails or malware. They don’t even need too much time to perform their malicious activities.
As Bitdefender experts highlight, it’s much more efficient for cybercriminals to hijack active accounts and utilize them for spam than it is to register new accounts. That’s because most email service providers still use decent CAPTCHAs for the account registration process.
To avoid falling victim to such attacks, experts advise users to log out of their email accounts once they’re done checking or writing messages. Secondly, always keep an up-to-date antivirus application running in the background since in many cases it will keep you out of harm’s way.
Finally, the old rule: never click on suspicious looking links, even if they appear to come from someone you trust.