Menu
AskMen.com website redirects to Caphaw malware, WebSense says

AskMen.com website redirects to Caphaw malware, WebSense says

High-traffic websites can potentially expose thousands of visitors to automated attacks

Injected JavaScript on the main page of AskMen.com was redirecting visitors to domains that delivered malware, according to vendor WebSense.

Injected JavaScript on the main page of AskMen.com was redirecting visitors to domains that delivered malware, according to vendor WebSense.

AskMen.com, a popular website with millions of monthly visitors, was redirecting visitors to other domains that delivered the Caphaw malware, according to security vendor WebSense.

The website, which is published by Ziff Davis, has been notified, but WebSense has not received an acknowledgment, wrote researcher Abel Toro on a company blog. AskMen.com could not immediately be reached for comment.

It's a common tactic for hackers to compromise legitimate high-traffic websites, causing visitors to be redirected to other domains that have been engineered to run an automated attack looking for software vulnerabilities.

"An attack of this scale can potentially infect tens of thousands of unsuspecting users due to the nature of the attack and the high popularity of the website," Toro wrote.

Hackers had injected JavaScript code on multiple parts of the landing page of AskMen.com, which then redirected people to other domains hosting the exploit code, Toro wrote. The injected code was found at the bottom of legitimate JavaScript pages on AskMen's site, he wrote.

The domains hosting the exploit code are constantly changing, Toro wrote. The injected JavaScript code takes the current date and then uses an algorithm to hash that data, which generates a domain name where the hackers have hosted the exploit kit.

A new attack domain is generated every day, as such malicious URLs are usually blacklisted after a short time by security companies. That domain calculation is predictable, however, which allowed WebSense to calculate future domains that will be used, Toro wrote.

Those malicious domains are likely hosting the "Nuclear Pack" exploit kit, which is an attack tool that hunts for software vulnerabilities. In the AskMen.com attack, the Nuclear Pack tries exploits for either outdated Java or Adobe Systems' Reader software, Toro wrote.

If the attack is successful, a malicious software called "Caphaw" is installed, which has complete control over the computer, Toro wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitymalwarewebsenseExploits / vulnerabilitiesAskMen.com

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments