More than one hundred HTML pages in a section designed to help graduating MBA students find job postings got hit by hackers, according to the U.K.-based software security firm. The havoc was caused by the injection of malicious JavaScript code into BusinessWeek's backend database. The code is thought to have originated from servers in Russia.
"All it takes is one vulnerable page," said Graham Cluley, senior technology consultant for Sophos, in an e-mail. "Hackers use search engines all the time to get an entry way into databases. For this reason, Web applications should have the lowest possible privileges."
Cluley cited a recent Sophos report that estimated there is a daily average of about 16,200 infected Web pages shuffled into the sites of trusted brands.
SQL injection attacks have become a concern for Windows enterprise professionals this year. In April, security consultancy White Hat identified isolated cases of SQL-based Web sites injected with malicious JavaScript code. Perhaps the worst of it was seen January when a widespread barrage of SQL injection attacks occurred.
At that time, tens of thousands of Windows Servers and SQL Servers supporting enterprise workstations were affected -- not to mention several thousand Web sites with .gov and .edu domain suffixes. Many of the problems were remedied before serious damage could be done.
Sophos recommends a few best practices to avoid vulnerability to SQL injection attacks. First, tighten up security in custom application code. Next, control access privileges to the enterprise database. Also, use server logs to monitor HTTP requests and query strings.