"LizaMoon" Detection Added to Nessus, PVS and LCE
Nessus plugin 29871 has been updated to look for the presence of malicious JavaScript on a remote web site.
(See Attack on ASP site that uses a SQL server database)
Below is an example of the plugin report:
Click for larger image
The Passive Vulnerability Scanner (PVS) has also been updated with plugin ID 5880, which will look for the malicious URL in transit across the network and fire an alert.
The Log Correlation Engine has been updated to include a TASL to look for queries that match the query being used in the LizaMoon attacks. For example, the SQL query used in the injection attacks has presented itself as:
surveyID=91+update+usd_ResponseDetails+set+categoryName=REPLACE(cast(categor |
(From: Attack on ASP site that uses a SQL server database)
The query used by LizaMoon is not unique to this particular malware so the TASL script will pick up similar SQL injection attacks.
Related Articles
- Log Analysis
- Nessus
- Passive Network Monitoring