Monster.com took a portion of its Web site offline Monday as researchers reported that it had been compromised by an IFrame attack and was being used to infect visitors with a multi-exploit attack kit.
According to Internet records, the Russian Business Network (RBN) hacker network may be involved.
Parts of the Monster Company Boulevard, which lets job hunters search for positions by company, were unavailable Monday; by evening, the entire section was dark. Most major American companies are represented on the site -- Google's cache of the page that shows only those firms that begin with the letter B, for example, included Banana Republic, Bank of America, Black & Decker, Boeing, Broadcom and Budget Car Rental.
Job seekers who used Monster's by-company directory on Monday before the site was yanked were pounced on by Neosploit, an attack tool kit similar to the better-known Mpack, said Roger Thompson, chief technology officer at Exploit Prevention Labs Inc.
"A typical infective URL was http://company.monster.com/toyfs/, which is Toyota [Financial's] section]," said Thompson in an instant message exchange Monday night. "Or http://company.monster.com/bestbuy, which is Best Buy's."
The injection of the malicious IFrame code into the Monster.com site probably happened Monday, he added. "It was interesting that we got five or so hits in the space of a few hours today, but none before that. I think it happened today."
Like many other IFrame exploits, this one silently redirected the user's browser to another site hosting Neosploit. In the case of at least one of the exploit sites Thompson identified, there's a connection to the notorious RBN, the hacker and malware hosting network that recently shifted operations to China, then mysteriously abandoned the IP blocks it had acquired in China, seemingly vanishing from the Internet.
The IP address of the exploit site is assigned to a server in Australia that is part of the "myrdns.com" domain. That domain, in turn, is registered to a Hong Kong Internet service provider called HostFresh Internet. Both HostFresh and myrdns.com have been linked to RBN activities, including the long-running IFrame Cash scheme, in which RBN pays small site owners a commission for injecting IFrame exploits on other sites.
Thompson said he had just started digging into the Monster.com hack on Monday afternoon. "It is not clear how many pages were affected, but it is likely that the attack was the same for all companies on the site, which might turn out to be a pretty good set of the Fortune 500," he said on his blog.
Monster.com last made security news in August, when the company acknowledged that hackers had looted its database for weeks, perhaps months, then used that information to craft and send targeted e-mails that pitched money laundering jobs or tried to trick recipients into downloading malware.
Monster.com was not available for comment.