Samy, the author of the worm, was on a mission to be famous, and as such the payload was relatively benign. But, consider what he might have done with control of over one million Web browsers and the gigabits of bandwidth at their disposal – browsers that were also potentially logged-in to Google, Yahoo, Microsoft Passport, eBay, Web banks, stock brokerages, blogs, message boards, or any other custom Web applications. It’s critical that we begin to understand the magnitude of the risk associated with XSS malware and the ways that companies can defend themselves and their users, especially when the malware originates from trusted websites and aggressive authors.
In this white paper we will provide an overview of XSS; define XSS worms; and, examine propagation methods, infection rates, and potential impact. Most importantly, we will outline immediate steps enterprises can take to defend their
10 Quick Facts About XSS Viruses and Worms:
What You Need to Know Now
- Are likely to originate on popular websites with community-driven features such as social networking, blogs, user reviews, message boards, chat rooms, Web mail, and wikis.
- Can occur at any time because the vulnerability (Cross-Site Scripting) required for propagation exists in over 80% of all websites.
- Are capable of propagating faster and cleaner than even the most notorious worms such as Code Red, Slammer and Blaster.
- Could create a Web browser botnet enabling massive DDoS attacks. The potential also exists to damage data, send spam, or defraud customers.
- Maintain operating system independence (Windows, Linux, Macintosh OS X, etc.), since execution occurs in the Web browser.
- Circumvent network congestion by propagating in a Web server-to-Web browser (client-server) model rather than a typical blind peer-to-peer model.
- Do not rely on Web browser or operating system vulnerabilities.
- Are easier to stop than traditional Internet viruses because denying access to the infectious website will quarantine the spread.