Source |
Checkpoint |
Identifiant |
1030 |
Date de publication |
2016-02-11 20:50:21 (vue: 2016-02-11 20:50:21) |
Titre |
Campaign Targeting WordPress: Users being Redirected to Angler Exploit Kit |
Texte |
In the past week, a massive campaign targeting WordPress-based websites has been reported by several security vendors, including Sucuri and Malwarebytes. In the previous iteration, unsuspecting victims were redirected to domains hosting ads which, if clicked, sent them to the Nuclear Exploit Kit landing page. Check Point security analysts have recently observed a change in […] |
Envoyé |
Oui |
Condensat |
ads analysts angler appeared based been being blog campaign change check clicked domains exploit first has have hosting including iteration kit landing malwarebytes massive nuclear observed page past point post previous recently redirected reported security sent several sucuri targeting them unsuspecting users vendors victims websites week which wordpress wordpress: |
Tags |
|
Stories |
|
Notes |
|
Move |
|