The cat came back the very next day... and it keeps coming back.
A malvertising operation designed to infect online publishers with browser-hijacking malware called Ghostcat-3PC has launched at least 18 separate infection campaigns in the last three months alone, according to a new report from the Digital Security & Operations (DSO) team at The Media Trust. Over that time, the DSO team stopped more than 130 distinct attacks, the report continues.
So far, it appears that Ghostcat's owners have been targeting website visitors based in the U.S. and Europe, with a goal to hijack their mobile browser sessions. At this point, there are at least four different versions of the malware, which leverage obfuscated code and delivery patterns to avoid signature-based detection.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.