About: Iframe virus

An Entity of Type: mean of transportation, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

An Iframe virus is malicious computer code, being considered as form of malware, that infects web pages on websites, most of them using iframe HTML code, to cause damage by injecting <<a href="/wiki/HTML_element#iframe" title="HTML element">iframe</a>> tags into the website. Code may be injected into HTML, PHP or ASP source files. The virus may make its presence known by scanning for home page files such as index.php, index.html or default.html and inject the iframe code in them. The iframe code is usually found near the beginning on the web page. They may also infect through themes or templates of content management systems. The virus will also modify .htaccess and hosts files, and create images.php files in directories named 'images'. The infection is not a server-wide exploit, it will o

Property Value
dbo:abstract
  • Un virus iframe es un código malicioso, considerado una forma de malware, que infecta páginas web en sitios web, la mayoría de ellos utilizando el código HTML iframe, para causar daño al inyectar etiquetas en el sitio web.<sup id="cite_ref-1" class="reference separada"><a href="#cite_note-1"><span class="corchete-llamada">[</span>1<span class="corchete-llamada">]</span></a></sup>​ El código puede ser inyectado en archivos fuente <a href="/wiki/HTML" title="HTML">HTML</a>, <a href="/wiki/PHP" title="PHP">PHP</a>, <a href="/wiki/Active_Server_Pages" title="Active Server Pages">ASP</a> o tpl. El virus puede darse a conocer al escanear archivos de página de inicio , como index.php, index.html o default.html e el código iframe en ellos.<sup id="cite_ref-2" class="reference separada"><a href="#cite_note-2"><span class="corchete-llamada">[</span>2<span class="corchete-llamada">]</span></a></sup>​ El código iframe se suele encontrar normalmente cerca del principio de la página web. También pueden infectar a través de temas o plantillas de <a href="/wiki/Sistema_de_gesti%C3%B3n_de_contenidos" title="Sistema de gestión de contenidos">sistemas de administración del contenido</a>. El virus también modificará .<a href="/wiki/.htaccess" title=".htaccess">htaccess</a> y archivos de <a href="/wiki/Archivo_hosts" title="Archivo hosts">anfitriones</a> (hosts), y crear archivos images.php en directorios denominados 'imágenes'. La infección no es una explotación del lado dle servidor, ya que solo infecta sitios en el servidor de los que tiene sus contraseñas.</p><p>Este reciente aumento de servidores web comprometidos, ha generado discusiones en foros y blogs en línea. Las infecciones de malvare en la web, perjudican a las empresas; Google, Firefox, <a href="/wiki/Internet_Explorer" title="Internet Explorer">Internet Explorer</a> y las empresas <a href="/wiki/Antivirus" title="Antivirus">antivirus</a> ponen en una lista negra los sitios infectados, las empresas pierden ingresos y los sitios sufren daños en su marca y reputación.</p><p>Un virus iframe es un tipo de badvare. "Los productores de badvare desarrollan constantemente nuevas y creativas formas de instalar badvare en su ordenador".<sup id="cite_ref-3" class="reference separada"><a href="#cite_note-3"><span class="corchete-llamada">[</span>3<span class="corchete-llamada">]</span></a></sup>​ La distribución de badvare se ha ampliado más allá de los canales tradicionales, como los virus de <a href="/wiki/Correo_electr%C3%B3nico" title="Correo electrónico">correo electrónico</a>, a métodos más difíciles de evitar como las "descargas drive-by" automatizadas que son lanzadas por páginas web comprometidas.</p><h2><span class="mw-headline" id="Variantes_iframe">Variantes iframe</span><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Virus_iframe&action=edit&section=1" title="Editar sección: Variantes iframe">editar</a><span class="mw-editsection-bracket">]</span></span></h2><p>A veces las variantes del iframe vienen en forma de <a href="/wiki/JavaScript" title="JavaScript">JavaScript</a>. Las etiquetas de iframe pueden no verse en texto plano en la fuente, porque está codificado. <sup id="cite_ref-4" class="reference separada"><a href="#cite_note-4"><span class="corchete-llamada">[</span>4<span class="corchete-llamada">]</span></a></sup>​ Si el código del script codificado es decodificado, contendrá el código para invocar el iframe a través de JavaScript.</p><h2><span class="mw-headline" id="Referencias">Referencias</span><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Virus_iframe&action=edit&section=2" title="Editar sección: Referencias">editar</a><span class="mw-editsection-bracket">]</span></span></h2><div class="listaref" style="list-style-type: decimal;"><ol class="references"><li id="cite_note-1"><span class="mw-cite-backlink"><a href="#cite_ref-1">↑</a></span> <span class="reference-text"><span class="citation web"><a rel="nofollow" class="external text" href="http://paramprojects.com/website/faq/detection/webmasters-call-it-iframe-virus-why">«Why people call it iframe virus? How do we remove and clean?»</a>.</span><span title="ctx_ver=Z39.88-2004&rfr_id=info%3Asid%2Fes.wikipedia.org%3AVirus+iframe&rft.btitle=Why+people+call+it+iframe+virus%3F+How+do+we+remove+and+clean%3F&rft.genre=book&rft_id=http%3A%2F%2Fparamprojects.com%2Fwebsite%2Ffaq%2Fdetection%2Fwebmasters-call-it-iframe-virus-why&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook" class="Z3988"><span style="display:none;"> </span></span></span></li><li id="cite_note-2"><span class="mw-cite-backlink"><a href="#cite_ref-2">↑</a></span> <span class="reference-text"><span class="citation web"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110315214411/http://www.couponsforhostgator.org/how-to-protect-your-hostgator-website-from-malware-such-as-iframe-injection.html">«How to Protect Your Website From Malware Such As Iframe Injection»</a>. Archivado desde <a rel="nofollow" class="external text" href="http://www.couponsforhostgator.org/how-to-protect-your-hostgator-website-from-malware-such-as-iframe-injection.html">el original</a> el 15 de marzo de 2011<span class="reference-accessdate">. Consultado el 10 de marzo de 2011</span>.</span><span title="ctx_ver=Z39.88-2004&rfr_id=info%3Asid%2Fes.wikipedia.org%3AVirus+iframe&rft.btitle=How+to+Protect+Your+Website+From+Malware+Such+As+Iframe+Injection&rft.genre=book&rft_id=http%3A%2F%2Fwww.couponsforhostgator.org%2Fhow-to-protect-your-hostgator-website-from-malware-such-as-iframe-injection.html&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook" class="Z3988"><span style="display:none;"> </span></span></span></li><li id="cite_note-3"><span class="mw-cite-backlink"><a href="#cite_ref-3">↑</a></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://stopbadware.org/home/badware">What is badware? | StopBadware</a></span></li><li id="cite_note-4"><span class="mw-cite-backlink"><a href="#cite_ref-4">↑</a></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://paramprojects.com/website/faq/malicious-codes/i-find-suspicious-javascript-code-my-files-it-iframe-virus">I find suspicious javascript code in my files. Is it iframe virus? | Website development</a></span></li></ol></div><style data-mw-deduplicate="TemplateStyles:r144106945">.mw-parser-output .mw-authority-control{margin-top:1.5em}.mw-parser-output .mw-authority-control .navbox hr:last-child{display:none}.mw-parser-output .mw-authority-control .navbox+.mw-mf-linked-projects{display:none}.mw-parser-output .mw-authority-control .mw-mf-linked-projects{display:flex;padding:0.5em;border:1px solid #c8ccd1;background-color:#eaecf0;color:#222222}.mw-parser-output .mw-authority-control .mw-mf-linked-projects ul li{margin-bottom:0}</style><div class="mw-authority-control"><div role="navigation" class="navbox" aria-label="Navbox" style="width: inherit;padding:3px"><table class="hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width: 12%; text-align:center;"><a href="/wiki/Control_de_autoridades" title="Control de autoridades">Control de autoridades</a></th><td class="navbox-list navbox-odd" style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px"><div style="padding:0em 0.25em"><ul><li><b>Proyectos Wikimedia</b></li><li><span style="white-space:nowrap;"><a href="/wiki/Wikidata" title="Wikidata"><img alt="Wd" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/20px-Wikidata-logo.svg.png" decoding="async" width="20" height="11" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x" data-file-width="1050" data-file-height="590" /></a> Datos:</span> <span class="uid"><a href="https://www.wikidata.org/wiki/Q5991258" class="extiw" title="wikidata:Q5991258">Q5991258</a></span></li></ul></div></td></tr></tbody></table></div><div class="mw-mf-linked-projects hlist"><ul><li><span style="white-space:nowrap;"><a href="/wiki/Wikidata" title="Wikidata"><img alt="Wd" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/20px-Wikidata-logo.svg.png" decoding="async" width="20" height="11" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x" data-file-width="1050" data-file-height="590" /></a> Datos:</span> <span class="uid"><a href="https://www.wikidata.org/wiki/Q5991258" class="extiw" title="wikidata:Q5991258">Q5991258</a></span></li></ul></div></div><!-- NewPP limit reportParsed by mw1370Cached time: 20221213080415Cache expiry: 1814400Reduced expiry: falseComplications: []CPU time usage: 0.091 secondsReal time usage: 0.124 secondsPreprocessor visited node count: 171/1000000Post‐expand include size: 5142/2097152 bytesTemplate argument size: 0/2097152 bytesHighest expansion depth: 5/100Expensive parser function count: 0/500Unstrip recursion depth: 0/20Unstrip post‐expand size: 4118/5000000 bytesLua time usage: 0.053/10.000 secondsLua memory usage: 2143412/52428800 bytesNumber of Wikibase entities loaded: 1/400--><!--Transclusion expansion time report (%,ms,calls,template)100.00% 104.599 1 -total 58.30% 60.979 1 Plantilla:Control_de_autoridades 41.61% 43.522 1 Plantilla:Listaref 36.22% 37.885 2 Plantilla:Cita_web--><!-- Saved in parser cache with key eswiki:pcache:idhash:9427280-0!canonical and timestamp 20221213080415 and revision id 147278630. --></div> (es)
  • An Iframe virus is malicious computer code, being considered as form of malware, that infects web pages on websites, most of them using iframe HTML code, to cause damage by injecting <<a href="/wiki/HTML_element#iframe" title="HTML element">iframe</a>> tags into the website. Code may be injected into HTML, PHP or ASP source files. The virus may make its presence known by scanning for home page files such as index.php, index.html or default.html and inject the iframe code in them. The iframe code is usually found near the beginning on the web page. They may also infect through themes or templates of content management systems. The virus will also modify .htaccess and hosts files, and create images.php files in directories named 'images'. The infection is not a server-wide exploit, it will only infect sites on the server that it has passwords to. This recent surge in compromised web servers has generated discussions in online forums and blogs. Web malware infections hurt businesses; Google, Firefox, Internet Explorer and anti-virus companies blacklist infected sites, businesses lose revenue and sites suffer damage to their brand and reputation. An iframe virus is a type of badware. "Badware producers are constantly developing new, creative ways to install badware onto your computer". Badware distribution has been expanded beyond traditional channels like email viruses to harder-to-avoid methods like automated “drive-by downloads” that are launched by compromised web pages. (en)
dbo:wikiPageID
  • 24538627 (xsd:integer)
dbo:wikiPageLength
  • 3219 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 1098947715 (xsd:integer)
dbo:wikiPageWikiLink
dbp:wikiPageUsesTemplate
dcterms:subject
gold:hypernym
rdf:type
rdfs:comment
  • Un virus iframe es un código malicioso, considerado una forma de malware, que infecta páginas web en sitios web, la mayoría de ellos utilizando el código HTML iframe, para causar daño al inyectar etiquetas en el sitio web.<sup id="cite_ref-1" class="reference separada"><a href="#cite_note-1"><span class="corchete-llamada">[</span>1<span class="corchete-llamada">]</span></a></sup>​ El código puede ser inyectado en archivos fuente <a href="/wiki/HTML" title="HTML">HTML</a>, <a href="/wiki/PHP" title="PHP">PHP</a>, <a href="/wiki/Active_Server_Pages" title="Active Server Pages">ASP</a> o tpl. El virus puede darse a conocer al escanear archivos de página de inicio , como index.php, index.html o default.html e el código iframe en ellos.<sup id="cite_ref-2" class="reference separada"><a href="# (es)
  • An Iframe virus is malicious computer code, being considered as form of malware, that infects web pages on websites, most of them using iframe HTML code, to cause damage by injecting <<a href="/wiki/HTML_element#iframe" title="HTML element">iframe</a>> tags into the website. Code may be injected into HTML, PHP or ASP source files. The virus may make its presence known by scanning for home page files such as index.php, index.html or default.html and inject the iframe code in them. The iframe code is usually found near the beginning on the web page. They may also infect through themes or templates of content management systems. The virus will also modify .htaccess and hosts files, and create images.php files in directories named 'images'. The infection is not a server-wide exploit, it will o (en)
rdfs:label
  • Virus iframe (es)
  • Iframe virus (en)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License