Mass website compromise

What is it?
Code is being introduced to website-hosting companies, like BlueHost, DreamHost and Network Solutions, via a gamut of vulnerabilities. The LAMP stack, Wordpress CMS and basic server configuration errors are equally suspected – PHP being the common component in most attacks.

How does it work?
Under the covers lurks carefully crafted code that intelligently interprets the GET requests and returns different HTML content depending on who or what is visiting. This code is chiefly used for BlackHat SEO, while other times malicious URLs are injected.

How can I prevent it?
Some investigations have taken months to resolve with little help offered by the hosting company. As a result, the average user is more likely to come into contact with malware. Somehow, we must improve the abuse-reporting process and hold all parties involved accountable. This includes the registrars, the hosting companies, the website owners and the bad actors.

More in Opinions

Follow me on this, your security team includes non-security people

Follow me on this, your security team includes ...

A successful security professional will tap into an organization's entire employee base to get results. And the benefits will go both ways.

Me and my job: Marty Edwards, ICS-CERT

Me and my job: Marty Edwards, ICS-CERT

Marty Edwards' job is to coordinate efforts between the government and the private sector.

Debate: Is advanced malware no longer a problem when administrator rights are ...

In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.