Beladen changes tactics to direct compromised users to Shkarkimi

By

The payload site for the mass compromise known as Beladen has changed its name to Shkarkimi.

Websense Security Labs ThreatSeeker Network has detected that the new site is hosted on the same IP address as Beladen and the exploits it serves are the same. It claimed that the obfuscated typosquatting domain of Google-Analytics that led to the exploit site Shkarkimi is still massively injected.


 

At the time of writing it claimed that around 30,000 websites are injected with code that eventually leads to Shkarkimi.

 

Carl Leonard, threat research manager at Websense Security Labs, said: “Mass injections have obviously worked. Changing the fake Google analytics typo page to redirect to Shkarkimi has given new legs to a well known attack. For a short period this unknown element will dodge past security solutions that have yet to be updated with the change, leaving users exposed to exploit code.”

See original article on scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

CBA using facial recognition logins to verify disputed payments

CBA using facial recognition logins to verify disputed payments

Qantas contacted by "potential cyber criminal"

Qantas contacted by "potential cyber criminal"

SA Power Networks tackles IAM, cloud security under five-year strategy

SA Power Networks tackles IAM, cloud security under five-year strategy

Qantas facing 'significant' data theft after cyber attack

Qantas facing 'significant' data theft after cyber attack

Log In

  |  Forgot your password?