WordPress Vulnerability Caused The Independent Blog Page Hack
The blog page of The Independent, one of the top media websites in the United Kingdom, has been compromised and found redirecting users to a page that loads an exploit kit. This discovery was made while Trend Micro threat researchers were monitoring Angler Exploit Kit activities on November 21 onwards.
[Read: “The Independent” Blog Hacked, Leads to Ransomware]
The blog is reported to be running on an old version of WordPress (2.9.2). If a redirected user does not have an updated version of Adobe Flash Player, the system will be infected with ransomware.
The Angler Exploit Kit is the most active exploit kit that leverages on Adobe Flash zero-day vulnerabilities. Through this small window, threat actors were able to compromise the blog and potentially infect its readers. While the blog remains infected, the rest of The Independent’s website is clear of any other risks.
[Read: WordPress Vulnerability Puts Millions of Sites at Risk]
WordPress has since released updates to patch critical security vulnerabilities in their platform. However, The Independent’s blog remained outdated and vulnerable. Trend Micro strongly urges site administrators to upgrade their versions of WordPress to the latest version (4.3.1) to patch previous vulnerabilities.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases
- Exploring Potential Security Challenges in Microsoft Azure