iFrames and script tags are being used by malicious hackers to serve up drive-by internet attacks, silently and invisibly.
iFrames allow webmasters to embed the content of one webpage into another, seamlessly.
There are legitimate reasons why some websites may want to do that – but what cybercriminals do is exploit the functionality (presumably they have been able to gain write access to the website) to deliver malware such as fake anti-virus or a PDF vulnerability exploit to infect your computer.
What’s sneaky is that malicious hackers can make the embedded content invisible to the naked eye, by making the window zero by zero pixels in size. You can’t see the threat, but your web browser is still dragging it down.
Check out the following video by our own Chet Wisniewski, which shows how malicious iFrames work:
(Enjoy this video? Check out more on the SophosLabs YouTube channel.)
If you want to learn more you can subscribe to our YouTube channel for similar videos. But even better than that, we hold regular “Anatomy of Attack” events where we demonstrate malware threats and you can quiz Sophos experts.
If there’s not an “Anatomy of an Attack” event scheduled in your area soon, drop us a note and we’ll let you know if and when one is coming to your part of the world.
Empty picture frame image from Shutterstock.
This is great to see glad you guys are here. Is there a way, or code to pre screen, or uncover interference before it executes. Cause I don’t think anti virus would cover something it’s told is ‘fine’ don’t worry about it-it’s just the code. Or is there a ‘thing’ antivirus or other I can load into iPhone cause I don’t see ‘equipment’ makes much difference. I still get on the net. So whats the difference. I’d like a hardware to keep data as a perfect shot that is any breeches to code sets of alarm-no load quarantine. Showing where & why this trigger happened. Ideas??? I’m going from a point of knowing nothing. Thanks.
You had me up until the point where the browser did exactly its job and BLOCKED THE THREAT and you said "well, we're going to dismiss this for now" If the browser warns you and you do it anyway, my sympathy level goes to zero.
Jason, not all browsers warn you, it might be that IE is only one?
Hi,
in firefox you can take the extension “no-script” it turns off all javascripts on the loading of a website and you can allow by domain-name wich you would like to execute.
By the way sophos i like this site but “no-script” tells me that 18 Domains want to execute Javascript on this article. On my computer there is only 3 allowed and i can see the whole article. You tell us how dangerous it might be to allow the execution of foreign code, but what you show on this site?
We describe the various scripts the Naked Security website uses here:
http://nakedsecurity.sophos.com/cookies-and-scrip…
Hope that helps
The javascript loaded into an iframe from another domain is restricted and cannot do anything harmful other than annoy you with alerts or slow down your connection by making lots of requests. It cannot display any graphical elements to do phishing (since the iframe is 0x0), for instance.
Not exactly a security thread.
It's true old browsers had security issues regarding iframes but not modern ones
What's the point of loading js in a malicious iframe when you have access to the source code anyway.