Reddit swiftly squishes XSS worm

WTF comment spam script


Popular social news website Reddit has stopped the spread of a cross-site scripting (XSS) worm that hit the site on Monday.

The XSS worm spread via comments on the site, originally from the account of a user called xssfinder.

Reddit failed to filter out JavaScript in some cases, specifically when a user hovered his or her mouse over a link, a factor the miscreants behind xssfinder's account exploited to run a proof of concept attack.

In an apparent test attack, xssfinder posted a comment linked to malicious scripts on a thread called "Guy on a bike in New York 'high fives' people hailing cabs".

Users reading the comment ended up sending massive amounts of spam comments onto other Reddit threads.

Reddit administrators moved in promptly to close the vulnerability and restore order before things got out of hand. Throughout the confusion the site was never down.

xssfinder's account was deleted soon after the attack began, reports Finnish web security firm F-Secure.

F-Secure's full write-up of the attack, including screenshots, can be found here. One of the comment threads about the assault on Reddit can be found here. ®

Similar topics

Broader topics


Other stories you might like

  • Beijing probes security at academic journal database
    It's easy to see why – the question is, why now?

    China's internet regulator has launched an investigation into the security regime protecting academic journal database China National Knowledge Infrastructure (CNKI), citing national security concerns.

    In its announcement of the investigation, the China Cyberspace Administration (CAC) said:

    Continue reading
  • Israeli air raid sirens triggered in possible cyberattack
    Source remains unclear, plenty suspect Iran

    Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms. 

    While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat. 

    Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident. 

    Continue reading
  • Hackers weigh in on programming languages of choice
    Small, self-described sample, sure. But results show shifts over time

    Never mind what enterprise programmers are trained to do, a self-defined set of hackers has its own programming language zeitgeist, one that apparently changes with the wind, at least according to the relatively small set surveyed.

    Members of Europe's Chaos Computer Club, which calls itself "Europe's largest association of hackers" were part of a pool for German researchers to poll. The goal of the study was to discover what tools and languages hackers prefer, a mission that sparked some unexpected results.

    The researchers were interested in understanding what languages self-described hackers use, and also asked about OS and IDE choice, whether or not an individual considered their choice important for hacking and how much experience they had as a programmer and hacker.

    Continue reading

Biting the hand that feeds IT © 1998–2022