Beladen changes tactics to direct compromised users to Shkarkimi

By

The payload site for the mass compromise known as Beladen has changed its name to Shkarkimi.

Websense Security Labs ThreatSeeker Network has detected that the new site is hosted on the same IP address as Beladen and the exploits it serves are the same. It claimed that the obfuscated typosquatting domain of Google-Analytics that led to the exploit site Shkarkimi is still massively injected.


 

At the time of writing it claimed that around 30,000 websites are injected with code that eventually leads to Shkarkimi.

 

Carl Leonard, threat research manager at Websense Security Labs, said: “Mass injections have obviously worked. Changing the fake Google analytics typo page to redirect to Shkarkimi has given new legs to a well known attack. For a short period this unknown element will dodge past security solutions that have yet to be updated with the change, leaving users exposed to exploit code.”

See original article on scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?