Asus.com Compromised With Exploit Code 117
Juha-Matti Laurio writes in with news that the Web site of ASUSTeK Computer (asus.com) has been compromised to spread exploit code. The original report from Kaspersky Lab claimed that the compromise lead to code exploiting the recently patched Microsoft Windows Animated Cursor (.ANI) 0-day vulnerability, but sans.org found no evidence of this. Apparently a malicious iframe was added to one of the machines in asus.com's DNS round-robin.
Re:Ouch (Score:-1, Funny)
It's not just the admins. (Score:1, Funny)
But we can't blame just the admins. We also have to blame the network designers and integrators who actually put such systems into place. Again, if any of them recommends the use of Windows, then they are not performing their job correctly. They should be relieved of their duties.
Furthermore, we also have to blame the management that allows for the purchase and installation of those Windows systems. They should know by now that Windows is not the sort of system that should be used for any purpose whatsover. Again, any manager who in any way authorizes the use of Windows is not performing his or her job correctly. He or she should be relieved of his or her duties.
Re:Advice (Score:2, Funny)
Re:Further evidence that ... (Score:2, Funny)
I suspect the actual plan was to infect all the people mis-typing "anus.com"
P*S
Re:DNS needs improvment... (Score:4, Funny)
Re:Advice (Score:1, Funny)