> RewriteCond %{QUERY_STRING} .*DECLARE.*
> RewriteRule ^(.*)$  violation.htm [nc,L]

Ok, that looks short and simple enough that maybe I can handle
with 156 emails from the list.

I have never used an mod_rewrites or whatever, so I guess I should
put these on my VPS running MySQL and IIS6?

If so, is there a simple explanation of how to do it?  Oh wait, this
came from the cf-linux list.  The mod is a linux deal only, right?

You guys have got me worried...

Rick


> -----Original Message-----
> From: Terry Ford [mailto:[EMAIL PROTECTED]
> Sent: Friday, August 08, 2008 1:21 PM
> To: CF-Linux
> Subject: Re: SQL injection attacks getting out of control
> 
> Ok... here's what appears to be hitting us:
> 
> http://www.bloombit.com/Articles/2008/05/ASCII-Encoded-Binary-String-Automated-SQL-Injection.aspx
> 
> I decoded the hex in the attack strings I'm seeing right now, and most of 
> them are pointing to
> http://sdo.1000mg.cn/csrss/w.js.
> 
> That is the Asprox botnet, which went through ASP sites a few months ago...  
> looks like they
recruited a
> bunch of drones, and those drones have moved from ASP (verynx attacks) to 
> attack CF.   Pretty
ingenious
> really, infecting websites via injection attack in order to infect clients 
> with browser
vulnerabilities.
> 
> The more CF sites that get infected, the more drones that are recruited, and 
> the more persistent
the
> attacks become.
> 
> In theory this should taper off as the botnet moves on to their next target.  
> Looks like it's
hitting
> sites such as houseandfusion and our site hardest, which each have zillions 
> of pages indexed in
Google
> (they botnet chooses target pages from Google searches).
> 
> Whatever the case, from what I've seen on CF-talk it appears that these 
> attacks infected a lot of
CF
> servers, and as such we're likely going to be targeted hard in all manners of 
> attacks in the
future.
> Looks like a good lesson against CF sloppiness.
> 
> 
> p.s. we're up to 62000 attack attempts now in 5 hours.   Still accelerating, 
> but thankfully not
> exponential.
> 
> Here's the rewrite I'm using.   Am no mod_rewrite expert, but it appears to 
> be working:
> 
> RewriteCond %{QUERY_STRING} .*DECLARE.*
> RewriteRule ^(.*)$  violation.htm [nc,L]
> 
> Interesting philosophical thought:   I can't help but believe that the URL 
> rewriting we do over
much of
> our site (product.cfm?id=14  appearing as /product/14.html etc etc) has 
> helped reduce the attacks
> significantly.   It seems to me that such URL rewriting is actually a very 
> important security
tool, as
> we enter a period where botnets start targetting .cfm pages.    I plan on 
> increasing our CFM
obfuscation
> over the coming weeks to help hide CF from the search engines and automated 
> attacks.   Seems to me
that
> it's a lot safer presenting your entire site as HTML to the outside world.
> 
> Regards
> Terry
> 
> 
> 
> 
> --- On Fri, 8/8/08, Wil Genovese <[EMAIL PROTECTED]> wrote:
> 
> > From: Wil Genovese <[EMAIL PROTECTED]>
> > Subject: Re: SQL injection attacks getting out of control
> > To: "CF-Linux" <[email protected]>
> > Date: Friday, August 8, 2008, 12:11 PM
> > what is your rewrite rule?   I'm ok with mod-rewite, but
> > no expert
> > that's for sure.
> >
> >
> > Wil Genovese
> >
> > One man with courage makes a majority.
> > -Andrew Jackson
> >
> > A fine is a tax for doing wrong. A tax is a fine for doing
> > well.
> >
> >
> >
> 
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Adobe® ColdFusion® 8 software 8 is the most important and dramatic release to 
date
Get the Free Trial
http://ad.doubleclick.net/clk;203748912;27390454;j

Archive: http://www.houseoffusion.com/groups/CF-Linux/message.cfm/messageid:4435
Subscription: http://www.houseoffusion.com/groups/CF-Linux/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.14

Reply via email to