<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>ThreatSTOP subscribers are protected against visiting <a href="http://www.theregister.co.uk/2011/08/02/mass_injection_attack_goes_viral/">infected osComemrce sites</a> - current google reports over 5,000,000 hits for the vulnerability. The ip address for the most prevalent domain (willysy.com) is currently in our emergency feed, the one for the other domain (exero.eu) has been in one of our feeds for a week and has now been added to our emergency feed as well.</p> <!--more--><p>What this means is that if, by some chance, someone behind a ThreatSTOP protected firewall accidentally visits one of the infected osCommerce sites the iframe that causes the redirect to the malware dropper location&nbsp; will not load and thus the user is protected. It is likely (I have not confirmed this at the moment) that we already had the malware dropper IPs in our database but we now offer this additional layer of protection.</p></span>