Hundreds of websites based on WordPress 3.2.1 have been compromised, with visitors redirected to drive-by attack sites.
Threatpost reports that the exploit works by creating a page on a compromised WordPress site which redirects users to a drive-by attack site. The attack site then uses the Phoenix exploit kit to attack a victim’s computer.
Because most email filters have a list of suspicious websites, spam emails that link to a known attack site are usually blocked.
Sign up to continue
You've reached your article limit. Create a free account, or login to continue. Get our free newsletters in your inbox and extended article access by submitting your email.
Comments