Beladen changes tactics to direct compromised users to Shkarkimi

By
Follow google news

The payload site for the mass compromise known as Beladen has changed its name to Shkarkimi.

Websense Security Labs ThreatSeeker Network has detected that the new site is hosted on the same IP address as Beladen and the exploits it serves are the same. It claimed that the obfuscated typosquatting domain of Google-Analytics that led to the exploit site Shkarkimi is still massively injected.


 

At the time of writing it claimed that around 30,000 websites are injected with code that eventually leads to Shkarkimi.

 

Carl Leonard, threat research manager at Websense Security Labs, said: “Mass injections have obviously worked. Changing the fake Google analytics typo page to redirect to Shkarkimi has given new legs to a well known attack. For a short period this unknown element will dodge past security solutions that have yet to be updated with the change, leaving users exposed to exploit code.”

See original article on scmagazineuk.com

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

FBI remotely patched privately-owned routers to evict Russian GRU spies

FBI remotely patched privately-owned routers to evict Russian GRU spies

Dead cars tell tales by storing data that's never wiped

Dead cars tell tales by storing data that's never wiped

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

AI-boosted hacks with Anthropic’s Mythos could have dire consequences for banks

AI-boosted hacks with Anthropic’s Mythos could have dire consequences for banks

Log In

  |  Forgot your password?