Mass website compromise

Share this article:

What is it?
Code is being introduced to website-hosting companies, like BlueHost, DreamHost and Network Solutions, via a gamut of vulnerabilities. The LAMP stack, Wordpress CMS and basic server configuration errors are equally suspected – PHP being the common component in most attacks.

How does it work?
Under the covers lurks carefully crafted code that intelligently interprets the GET requests and returns different HTML content depending on who or what is visiting. This code is chiefly used for BlackHat SEO, while other times malicious URLs are injected.

How can I prevent it?
Some investigations have taken months to resolve with little help offered by the hosting company. As a result, the average user is more likely to come into contact with malware. Somehow, we must improve the abuse-reporting process and hold all parties involved accountable. This includes the registrars, the hosting companies, the website owners and the bad actors.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Me and my job: Michael Canavan, Kaspersky Lab North America

Me and my job: Michael Canavan, Kaspersky Lab ...

We catch up and learn a bit more about Michael Canavan, senior director, systems engineering, Kaspersky Lab North America.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Becoming a "security thinker"

Becoming a "security thinker"

Active security thinking ensures that we don't simply perpetuate security folklore.