WordPress Vulnerability Caused The Independent Blog Page Hack
The blog page of The Independent, one of the top media websites in the United Kingdom, has been compromised and found redirecting users to a page that loads an exploit kit. This discovery was made while Trend Micro threat researchers were monitoring Angler Exploit Kit activities on November 21 onwards.
The blog is reported to be running on an old version of WordPress (2.9.2). If a redirected user does not have an updated version of Adobe Flash Player, the system will be infected with ransomware.
The Angler Exploit Kit is the most active exploit kit that leverages on Adobe Flash zero-day vulnerabilities. Through this small window, threat actors were able to compromise the blog and potentially infect its readers. While the blog remains infected, the rest of The Independent’s website is clear of any other risks.
WordPress has since released updates to patch critical security vulnerabilities in their platform. However, The Independent’s blog remained outdated and vulnerable. Trend Micro strongly urges site administrators to upgrade their versions of WordPress to the latest version (4.3.1) to patch previous vulnerabilities.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: Trigona
- Steering Clear of Security Blind Spots: What SOCs Need to Know
- Understanding the Kubernetes Security Triad: Image Scanning, Admission Controllers, and Runtime Security
- Preempting Threats to Connected Cars: The Importance of Cybersecurity in a Data-Driven Automotive Ecosystem
- Your Stolen Data for Sale