Web security serviceWebsensehas identified an SQL injection attack on Apple’s web-based iTunes pages, detecting 28,000 instances of a LizaMoon JavaScript code embedded within the source code.

Affected pages are found to have the following line of code embedded into the page:

At the time of writing, the same Google search that was performed by Websense only reveals ten references of the same embed code, suggesting that Apple has identified the exploit and is actively working to close and remove any remaining instances:

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!

If you visit one of the affected pages, you will not notice any difference, that’s because script isn’t rendered due to the way Apple parses information.

As Websensepoints out, a quick look at the source code of the page shows a number of mentions of the LizaMoon code:

It is believed that iTunes, and the way it handles podcast RSS/XML feeds, is the culprit, allowing attackers to inject their own code into the feed. The tag, when live, was designed to direct users to a malicious website:defender-uqko.in.

Aquick searchshows that Apple isn’t the only web presence affected by the attack, with retailers, blogs and corporate websites also sporting the same chunk of code on their websites.

If you have visited Apple’s podcast pages, you need not worry because Apple has made sure scripts such as this don’t get the chance to run. As always, it is best to be vigilant and to not click through to any websites you do not trust.

Story byMatt Brian

Matt is the former News Editor for The Next Web. You can follow him on Twitter, subscribe to his updates on Facebook and catch up with him(show all)Matt is the former News Editor for The Next Web. You can follow him onTwitter, subscribe to his updates onFacebookand catch up with him onGoogle+.

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with