If that’s not a pattern and good timing, it’s a malicious anomaly. On the 31 of August, 2007, Bank of India was serving malware courtesy of the Russian Business Network. This week, evidence that the U.S Consulate in St. Petersburg, Russia was serving malware to its visitors proved to be true. The web site is now clean, but assessing the IFRAME-ed URLs used in the attack is possible as they’re still reachable. It’s still unknown for long the IFRAMEs remain embedded at the Consulate’s web site, as well as when were they cleaned, but the attack was still active on the 2nd of September, 2007, just two days after Bank of India’s malware attack. It’s also worth mentioning that compared to the most recent malware embedded attacks which had the IFRAMEs directly embedded within, in this one the IFRAME itself is obfuscated but the live exploit URL isn’t.
