Incident Response, Malware, TDR

Caphaw trojan being served up to visitors of, according to Websense

A highly popular website that attracts more than 10 million visitors each month – – is now redirecting users to a nasty piece of malware known as Caphaw, according to researchers with Websense Security Labs.

The host master of has been notified by Websense, but the security firm has not received a response or acknowledgment, according to a Monday post by Abel Toro, a Websense security researcher.

In a Tuesday email correspondence, Alex Watson, director of security research with Websense, told that visitors are being redirected to the Caphaw trojan via code that was injected on multiple pages across

It is a sneaky attack; the injected code loads automatically upon browsing to the main page, and silently redirects visitors to websites serving the exploit code, according to Toro, who added that the injected code is obfuscated and at the bottom of legitimate JavaScript pages.

“After visiting certain pages on, users were redirected to generated domains, where they would be exploited by a PDF or Java-based exploit – most likely via [the] Nuclear Pack exploit kit – and the Caphaw malware would be downloaded,” Watson said.

A variant of the Shylock banking trojan, Caphaw can be used to take control of infected systems, access files and folder via internal FTP server, redirect internet traffic via proxy server, send ICMP packets used in distributed denial-of-service attacks, and update itself.

“The Caphaw banking malware that was delivered by the exploit kit only affects Windows-based systems,” Watson said. “We have not seen any examples of users running iOS, Android, or Apple OS X being served different malware.”

The fact that no other publications from Ziff Davis – the company that acquired in 2013 – are being affected indicates that a local vulnerability, such as cross-site scripting (XSS), was most likely the vector used by attackers, Watson said. did not respond to requests for comment.

UPDATE: "We've done a thorough investigation and there is no evidence of any malware," an spokesperson told in a Tuesday email correspondence. "We take security issues very seriously and we have multiple measures in place to protect our users. We're also in contact with the vendor who purported to see evidence of an attack."

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.