all InfoSec news
Attackers Abuse Poorly Regulated Top-Level Domains in Ongoing Redirect Campaign
Feb. 18, 2022, 6:12 p.m. | Ben Martin
Security Boulevard securityboulevard.com
One of the more common infections that we see are site-wide redirects to spam and scam sites, achieved by attackers exploiting newly found vulnerabilities in popular WordPress plugins. If you’ve ever been redirected to a page that looks something like this, then you’ve fallen victim to such an attack:
Once the user clicks through the verification process they are sent to a fake CAPTCHA page asking the user to click to prove they are a human:
As we have reported …
abuse attackers domains malware website malware infections website security wordpress security
More from securityboulevard.com / Security Boulevard
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Check Team Members / Cyber Consultants / Pen Testers
@ Resillion | Birmingham, United Kingdom
Security Officer Field Training Officer- Full Time (Harrah's LV)
@ Caesars Entertainment | Las Vegas, NV, United States
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States
AWS Security Engineer
@ IntelliPro Group Inc. | Palo Alto, CA
Information Security Analyst
@ Freudenberg Group | Alajuela