WordPress Vulnerability Caused The Independent Blog Page Hack
The blog page of The Independent, one of the top media websites in the United Kingdom, has been compromised and found redirecting users to a page that loads an exploit kit. This discovery was made while Trend Micro threat researchers were monitoring Angler Exploit Kit activities on November 21 onwards.
[Read: “The Independent” Blog Hacked, Leads to Ransomware]
The blog is reported to be running on an old version of WordPress (2.9.2). If a redirected user does not have an updated version of Adobe Flash Player, the system will be infected with ransomware.
The Angler Exploit Kit is the most active exploit kit that leverages on Adobe Flash zero-day vulnerabilities. Through this small window, threat actors were able to compromise the blog and potentially infect its readers. While the blog remains infected, the rest of The Independent’s website is clear of any other risks.
As a favoured platform by bloggers, WordPress is a big target for threat actors. Earlier this year, the platform was at risk from a zero-day vulnerability that allowed an attacker to launch stored cross-site scripting (XSS) attacks through comments, forums, discussions, and other avenues. This allows the attacker to execute JavaScript code in the website’s administrator window and gain administrator privileges.
[Read: WordPress Vulnerability Puts Millions of Sites at Risk]
WordPress has since released updates to patch critical security vulnerabilities in their platform. However, The Independent’s blog remained outdated and vulnerable. Trend Micro strongly urges site administrators to upgrade their versions of WordPress to the latest version (4.3.1) to patch previous vulnerabilities.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Artículos Recientes
- The Industrialization of Botnets: Automation and Scale as a New Threat Infrastructure
- From Holiday Snap to Custom Scam in 30 Minutes: How AI Turns Public Photos Into Targeted Attacks
- From LinkedIn to Tailored Attack in 30 Minutes: How AI Accelerates Target Profiling for Cybercrime
- Threat Attribution Framework: How TrendAI™ Applies Structure Over Speculation
- AI Skills as an Emerging Attack Surface in Critical Sectors: Enhanced Capabilities, New Risks
The Industrialization of Botnets: Automation and Scale as a New Threat Infrastructure
AI Security Starts Here: The Essentials for Every Organization
Stay Ahead of AI Threats: Secure LLM Applications With Trend Vision One