The Latest in IT Security

Compromised Websites unknowingly host malware

21
Nov
2011

The email shown below is a current example of “payment rejected” emails that have circulated in large numbers in the past 3 weeks. The links in the email lead to malware similar to that described a previous post.

In the example above the malicious JavaScript files were hidden within the folders of a legitimate site: http://www.dalgiocabondo.com/. In this case the offending files have been quickly removed.

The numerous examples of similar misuse of legitimate sites have promoted Commtouch to team with StopBadware to investigate this phenomenon more deeply. As a first step we are conducting a survey of website owners who have had (or are currently having) their sites hacked and misused. The survey aims to answer questions such as:

  • How did the compromise happen?
  • What did the cybercrimnals do with your stolen site?
  • How were you made aware of the hack?
  • What did you do to fix the problem?

The survey is available in the preceding blog post

About StopBadware

StopBadware focuses on giving website owners, web hosting providers, end users, and URL blacklist operators the tools they need to fulfill their respective responsibilities in making the Internet safer. From the StopBadware website:

Together with our partners we:

Learn more about what we do or how to get involved.

 

Leave a reply


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments