Some website hacks aim to make some political statements. Defacements are well known for this. Some infections redirect visitors to scam sites that push (usually counterfeit) goods or (often illegal) services. But what would you feel if your site redirected visitors to a political news site?
This time we are talking about an attack that mainly targets UK sites and has redirected over 2 million (mostly UK) visitors to YourBrexit[.]net – a site that publishes politically-charged commentary about Brexit.
Continue reading Website Malware: Unwanted Exit to YourBrexit at Sucuri Blog.
from Website Malware: Unwanted Exit to YourBrexit
We’ve been watching a specific WordPress infection for several months and would like to share details about it.
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators will clean up the infection and look no further. Many go on to patch vulnerable software, change their passwords, and perform other post-hack steps. All of this is good, but hackers who follow through the sustainment phase of the attack also leave behind ways to easily reinfect the site.
After breaking into a website, hackers want to make sure they still have access if the original security hole is closed.
Continue reading Learning From Buggy WordPress Wp-login Malware at Sucuri Blog.
from Learning From Buggy WordPress Wp-login Malware