Mass website compromise


What is it?
Code is being introduced to website-hosting companies, like BlueHost, DreamHost and Network Solutions, via a gamut of vulnerabilities. The LAMP stack, Wordpress CMS and basic server configuration errors are equally suspected – PHP being the common component in most attacks.

How does it work?
Under the covers lurks carefully crafted code that intelligently interprets the GET requests and returns different HTML content depending on who or what is visiting. This code is chiefly used for BlackHat SEO, while other times malicious URLs are injected.

How can I prevent it?
Some investigations have taken months to resolve with little help offered by the hosting company. As a result, the average user is more likely to come into contact with malware. Somehow, we must improve the abuse-reporting process and hold all parties involved accountable. This includes the registrars, the hosting companies, the website owners and the bad actors.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.