Mass website compromise

Share this article:

What is it?
Code is being introduced to website-hosting companies, like BlueHost, DreamHost and Network Solutions, via a gamut of vulnerabilities. The LAMP stack, Wordpress CMS and basic server configuration errors are equally suspected – PHP being the common component in most attacks.

How does it work?
Under the covers lurks carefully crafted code that intelligently interprets the GET requests and returns different HTML content depending on who or what is visiting. This code is chiefly used for BlackHat SEO, while other times malicious URLs are injected.

How can I prevent it?
Some investigations have taken months to resolve with little help offered by the hosting company. As a result, the average user is more likely to come into contact with malware. Somehow, we must improve the abuse-reporting process and hold all parties involved accountable. This includes the registrars, the hosting companies, the website owners and the bad actors.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in Opinions

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected ...

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem ...

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?