[95577] in North American Network Operators' Group
Re: On-going Internet Emergency and Domain Names
daemon@ATHENA.MIT.EDU (Florian Weimer)
Sat Mar 31 15:23:59 2007
From: Florian Weimer <fw@deneb.enyo.de>
To: "Fergie" <fergdawg@netzero.net>
Cc: smb@cs.columbia.edu, jeffshultz@wvi.com, nanog@merit.edu
Date: Sat, 31 Mar 2007 21:20:07 +0200
In-Reply-To: <20070330.200624.774.184549@webmail21.lax.untd.com> (Fergie's
message of "Sat, 31 Mar 2007 03:05:32 GMT")
Errors-To: owner-nanog@merit.edu
* Fergie:
> While the 0-day exploit is the ANI vulnerability, there are many,
> many compromised websites (remember the MiamiDolhins.com embedded
> javascript iframe redirect?) that are using similar embedded .js
> redirects to malware hosted sites which fancy this exploit.
>
> And some of them have vast audiences, increasing the potential
> for a major "issue" -- TBD.
In today's world of ubiquitous advertising, vast audiences equal lots
of money. That's why this is a problem which a few class-action suits
can and will fix.
The hard problem is repeated damage done by many small incidents.