Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Malicious Scripts Injected in Genuine Websites Seeing a Growth - Heimdal

Infosecurity-magazine.com reported on 4th September, 2015 quoting a recently released study by the security firm Heimdal Security as "The web is witnessing a surge in malicious scripts injected into genuine websites."

Heimdal Security noted that the attack has been conducted by systemically compromising websites that run an obsolete content management system (CMS) especially WordPress sites without patch or old plugins.

Heimdal says that WordPress is employed by 58.7% of all the sites whose content management system is known to them which is 24.3% of all websites. As there are around one billion websites in the world, it is estimated that more than 142 million websites might be potentially compromised. Moreover, more than 20% of WordPress supported websites run an obsolete version.

Infosecurity-magazine.com published a report on 4th September, 2015 quoting researchers as saying "Even websites which run the latest WordPress version could be open to such attack if they run obsolete plug-ins and require proper security settings. The number of prospective ransomware victims might be alarmingly high and as the attack is not only directed towards websites based on WordPress, the blow could be even more."

These scripts would redirect users to Web domains where instances of the Neutrino exploit kit were hosted.

Heimdal investigated and found that thedancingbutterfly.com domain was used to store the malicious injected scripts which would then redirect users to nkzppqzzzumhoap.ml where the exploit kit was hosted.

The last domain is hosted in the Netherlands on the servers of a Web hosting organization which is known to have hosted other same malicious campaigns before.

When the Teslacrypt ransomware installed on the user's computer, it does that a ransomware does best locking the user out of numerous files and then leaving a .txt and .html file on the desktop of the user, explaining the steps needed to take to get access back to the files.

In some cases, researchers also observed that the ransomware encrypts files and also downloads a Pony-based infostealer from the light-tech.pl domain.

Scmagazine.com published news on 4th September, 2015 quoting Andra Zaharia, a Marketing Specialist with Heimdal, as saying "We have already spotted 24 websites in Denmark which deliver the payload through the malicious script injection."

ยป SPAMfighter News - 9/18/2015

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page