At the initial IrissCon, in 2009, I discussed the investigation, analysis and resolution of a Web Application attack that was part of a larger criminal scareware campaign.
IRISS 13 Exploit q Exploited Sites hosted on one server § Microsoft FTPd & IIS 6.0 q Two most popular web site attacks – § Gumblar q PHP Sites § Asprox q SQL Injection
IRISS 23 Next Steps & Extra Info q Sans GCIH Gold Paper - Scareware & its evolution - Incident Handling Process q Full Incident Report - http://www.iriss.ie – in shared documents - http://www.hillick.net/things/scareware.doc
IRISS 24 References q Sunbelt Blog q Dancho Danchev Blog q SANS ISC (Thanks to @bojanz) q VRT-Sourcefire Blog q Symantec White Papers q Sans Forensics Blog