Malicious code is living on weeks after it has been removed from websites thanks to an unexpected culprit: cache servers.According to Finjan Software, which has just released its latest Web trends report, caching technology used by search engines, ISPs and large companies has been discovered to harbor certain kinds of malicious code even after the website that hosted it has been taken down. Such “infection-by-proxy” code can remain in caches for as long as two weeks, giving it a “life after death” at a time it would conventionally be assumed to have been neutralized. Although caching does not always save copies of everything on a website, it will still store code embedded in html, including programming formats such as Javascript.The company offered details of how code designed to exploit a number of vulnerabilities in Microsoft products from 2003 and 2004 was able to continue in the public domain, thanks to it hiding in the cache servers of one of three unnamed search engines. Although it is old, there is no reason why the same issue wouldn’t apply to recent issues on an unlimited scale, depending on the nature of the code and the way it was buried within cacheable content. And code pointing to malware such as Trojans would remain because of the issue, raising the level of risk further. “This is more than just a theoretical danger. It is possible that storage and caching servers could unintentionally become the largest ‘legitimate’ storage venue for malicious code,” said Finjan CTO Yuval Ben-Itzhak. “Almost every malicious website out there has a copy on a caching server.” The services affected by the cached malware had been informed in August. “What our latest report shows is that current processes to remove such malicious content from the Web are simply not going far enough to combat this very serious and growing threat.” This type of threat counts as new, though there have been several instances of malicious code using search engines to spread in other ways. In May, a McAfee report claimed that search engines were now a major channel for the inadvertent spread of malware by returning infected sites in search results.-John E. Dunn, Techworld.com (London)Keep checking in at our CSO Security Feed page for updated news coverage. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe