Beladen changes tactics to direct compromised users to Shkarkimi

By
Follow google news

The payload site for the mass compromise known as Beladen has changed its name to Shkarkimi.

Websense Security Labs ThreatSeeker Network has detected that the new site is hosted on the same IP address as Beladen and the exploits it serves are the same. It claimed that the obfuscated typosquatting domain of Google-Analytics that led to the exploit site Shkarkimi is still massively injected.


 

At the time of writing it claimed that around 30,000 websites are injected with code that eventually leads to Shkarkimi.

 

Carl Leonard, threat research manager at Websense Security Labs, said: “Mass injections have obviously worked. Changing the fake Google analytics typo page to redirect to Shkarkimi has given new legs to a well known attack. For a short period this unknown element will dodge past security solutions that have yet to be updated with the change, leaving users exposed to exploit code.”

See original article on scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Researchers detail Bluetooth headphone attack that can hijack smartphones

Researchers detail Bluetooth headphone attack that can hijack smartphones

Patients fret as ManageMyHealth data breach drama plays out

Patients fret as ManageMyHealth data breach drama plays out

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

Chinese cyberattacks on Taiwan infrastructure averaged 2.6 million a day in 2025

Chinese cyberattacks on Taiwan infrastructure averaged 2.6 million a day in 2025

Log In

  |  Forgot your password?