The social networking site MySpace.com is under what one computer security analyst calls an “amazingly virulent” attack caused by a worm that steals log-in credentials and spreads spam that promotes adware sites.The worm is infecting MySpace profiles with such efficiency that an informal scan of 150 found that close to a third were infected, said Christopher Boyd, security research manager at FaceTime Communications.MySpace, owned by News Corp., is estimated to have at least 73 million registered users.The worm works by using a cross-scripting weakness found around two weeks ago in MySpace and a feature within Apple Computer’s QuickTime multimedia player. The exploit starts with a user who visits a MySpace profile infected with an embedded QuickTime movie. The movie loads JavaScript code that overlays a row of menu options on a MySpace profile with a bogus menu. A QuickTime function, called the HREF track, can direct the player to use JavaScript commands to load webpages into a browser frame or window. The JavaScript feature in QuickTime has legitimate uses, “but there are a lot of legitimate uses for technology that can be misused,” said Ross Paul, senior product manager with Websense.If an option in the bogus menu is clicked, the user is directed to a fake log-in page hosted on another server where the person’s log-in details are captured. Websense has posted a screenshot of the fake log-in page.MySpace’s “seemingly random tendency” to expire user sessions or log out users makes it less noticeable to victims that an attack is under way, according to a Nov. 16 advisory by the Computer Academic Underground.Additionally, the worm places an embedded QuickTime movie on the user’s profile, which will then repeat the infection process for anyone who visits the profile.The worm has another malicious function. Once a profile is infected, the worm sends spam to other people in the user’s contact list. Those spam messages contain a file that appears to be a movie but instead is a link to a pornographic site that also hosts adware from Zango, Boyd said. Zango, formerly 180 Solutions, settled last month with the U.S. Federal Trade Commission for US$3 million over complaints it didn’t properly ask the consent of users before its adware was installed.Boyd said he’s heard anecdotal stories of users removing the worm’s JavaScript manually from their profile, but the worm reappears after some time if one of their friend’s profiles is infected. Several variants of the worm have also appeared, he said.While some of the websites hosting the malicious QuickTime movie have been taken down, others have appeared, Boyd said.The Firefox 2.0 browser was flagging some of the bogus log-in sites as phishing sites, Boyd said. However, phishing sites can be active for several hours before they are flagged, he said. MySpace officials in London couldn’t immediately comment Monday morning.By Jeremy Kirk, IDG News Service (London Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe