Global CyberSecurity

Attackers Abuse Poorly Regulated Top-Level Domains in Ongoing Redirect Campaign

0

Published on 02/18/2022 – Last Updated on 02/18/2022 by OTC

One of the more common infections that we see are site-wide redirects to spam and scam sites, achieved by attackers exploiting newly found vulnerabilities in popular WordPress plugins. If youโ€™ve ever been redirected to a page that looks something like this, then youโ€™ve fallen victim to such an attack:

Once the user clicks through the verification process they are sent to a fake CAPTCHA page asking the user to click to prove they are a human:

As we have reported in the past on this type of infection:

The goal is to trick visitors into clicking โ€œAllowโ€ when the site asks to subscribe to push notifications.

Continue reading Attackers Abuse Poorly Regulated Top-Level Domains in Ongoing Redirect Campaign at Sucuri Blog.

Adobe Patches Critical RCE Vulnerability in Magento2

Previous article

UMEX 2022 Daily Day 1 unmanned defense systems military training equipment exhibition Abu Dhabi UAE

Next article

You may also like

Comments

Comments are closed.