DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

Malicious Cyber Operation Hijacks Websites

March 15, 2023
Reading Time: 2 mins read
in Incidents

 

Since early September 2022, a malicious cyber operation has hijacked thousands of websites aimed at East Asian audiences and redirected visitors to adult-themed content.

The operation involves injecting malicious JavaScript code into the hacked websites and often connecting to the target web server using legitimate FTP credentials that the threat actor previously obtained through an unknown method.

Despite the breached websites being owned by both small firms and multinational corporations, utilizing different tech stacks and hosting service providers, a majority of them are either hosted in China or primed for Chinese users.

The URLs hosting the rogue JavaScript code are geofenced to limit its execution in certain East Asian countries.

The threat actor’s identity is unknown, and their precise motives have yet to be identified, but it is suspected that they intend to carry out ad fraud and SEO manipulation, or alternatively, drive inorganic traffic to these websites.

There are also indications that the campaign has set its sights on Android, with the redirection script leading visitors to gambling websites that urge them to install an app with an APK package name “com.tyc9n1999co.coandroid.”

Notably, the attacks do not involve phishing, web skimming, or malware infection.

Cloud security company Wiz noted that the fact that the breached websites utilize different tech stacks and hosting service providers has made it difficult to trace a common attack vector.

Additionally, the researchers Amitai Cohen and Barak Sharoni said that they remain unsure as to how the threat actor has been gaining initial access to so many websites and have yet to identify any significant commonalities between the impacted servers other than their usage of FTP.

Despite the attack’s apparent low sophistication, it is still unclear whether the threat actor is using a 0-day vulnerability.

Read More

Tags: CyberattacksData BreachEast AsiaGovernmentincidentsJavascriptJavaScriptsmaliciousMarch 2023
0
VIEWS
ADVERTISEMENT

Related Posts

KillNet Anonymous Sudan targets Australia

KillNet Anonymous Sudan targets Australia

March 30, 2023
Pakistan’s Supreme Court website attacked

Pakistan’s Supreme Court website attacked

March 30, 2023
SafeMoon liquidity pool hacked, $8.9M stolen

SafeMoon liquidity pool hacked, $8.9M stolen

March 30, 2023
DarkBit sells data from Israeli university

DarkBit sells data from Israeli university

March 30, 2023

More Articles

Document

Bringing Science to Digital Forensics with Standardized Forensic Corpora

April 18, 2022
Course

Introduction to Linux

September 1, 2020
Alerts

Malicious Tor Browser installer served through a popular Chinese YouTube channel

October 6, 2022
Alerts

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

December 6, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.