Category: Malware (Page 1 of 5)

Malware

Magento Infection Sends Stolen Credit Card Data To Black Market

Authors: SiteLock Research Analysts, Josh Martin and Michael Veenstra

While investigating suspicious files on a customer’s eCommerce site, the SiteLock Research Team found malicious payment processing code injected into Magento application files that skimmed credit card data and administrative login credentials. The malicious code sent stolen credit card data directly to a publicly accessible carding market where victim’s card details were listed for sale. In this article we analyze the infection, take a deeper look at the carding market, and discuss ways you can keep your site and your credit card data secure.

Read More

Website security

Fake Joomla! Plugin Keyscaptcha Still in the Wild

Fake plugins and extensions are a favorite, and particularly sneaky, way to inject malicious content into popular CMS platforms. Fake plugins disguise their malicious intent by mimicking the form and function of legitimate plugins. We will discuss a not-so-well-known fake Joomla! extension, what it does, and what you can do to protect your site from such attacks.

Read More

SiteLock Security by Obscurity Blog

Are You Certain Your Website is Secure from Cyberattacks?

Websites experience 22 cyberattacks per day on average. That’s more than 8,000 attacks per year, per website. You might assume the majority of these attacks are aimed at eCommerce sites because they accept and store credit card information, but actually, the eCommerce sector accounts for only one percent of compromised websites.

Read More

Web Application Security

Tolly Test Highlights Web Application Security Need

 24/7

Who works 24/7? Not you, I hope – but hackers around the globe are busy trying to compromise systems 24 hours a day, seven days a week. “Next-gen” is not just a convenient marketing term, it is very accurate label for new types of threats and new types of solutions designed to counter those threats.

The basic nature of PC and server (aka “endpoint”) security and threats to same had not changed in many years. For years, the enemy would be the rogue program (.EXE) or Word macro that would find its way on to our system and either destroy our data or perhaps surreptitiously take control of our system either to steal our data or add our system to its army of drones – or both.

The traditional endpoint security solution would rely on its researchers to learn the digital fingerprints – usually referred to as the signature – of the virus. Upon detection, the entire offending program or macro would be isolated (quarantined) and, ultimately, deleted.

Read More

Malvertising – What is it?

Can you tell the difference between the two ads below?

             Advertisement A                                       Advertisement B

Advertisement A       Advertisement Atag

They may appear to be identical, but actually, they are far from it. Advertisement A is a perfectly legitimate ad, while Advertisement B contains malware.

Advertisement B is an example of malvertising, or malicious advertising. Malvertising is a hack cybercriminals use to spread malware via online advertisements. As you can see, malvertisements are deceiving and the damage can go beyond your website by infecting your computer with malware.

Read More

Malware removal

How to Check for Malware in your Databases

Searching for content within a database can be a little trickier than searching files, but the options are pretty similar. Following up on last week’s blog titled, “How to Look for Malware in your Website Files” we talk about how to look for malware in databases and what types of things you should be looking for.

Read More

Malware Removal

How To Look For Malware In Website Files

It can come as quite a surprise when a site owner is notified that their site has been compromised with malware. After the shock wears off, and the immediate impact understood, it’s important to take stock of what has actually happened behind the scenes and then clean it up. The best advice anyone can give you is to make frequent, downloaded backups of your site in the event something happens to the live version so that the clean backup can replace the live, hacked version.

But what if there is no clean, viable backup available? In a world where websites have hundreds, if not thousands of files, how can any one person go about cleaning out an infection in just a small number of those files? In this two part series, we’ll talk about how to look for malware in both files and databases and give a couple examples of what to be on the lookout for.

Read More

Turkish SEO spam

Analysis Of An SEO Spam Campaign

Search engine spam, more frequently known as SEO spam, is a technique used to manipulate rankings in a way that is not allowed by search engine terms of service.

This week we’ll take a look at an interesting SEO spam campaign that recently came across the SiteLock research desk. Turkish escorts are apparently big business and we had the opportunity to dig a bit into the makings of a malicious Turkish escort spam campaign.

Read More

types of malware

Exploring the Different Types of Malware [Infographic]

Malware, short for malicious software, is typically installed on a website by cybercriminals. Malware is a broad term that refers to a variety of malicious programs. It can spread viruses, steal personal or financial data and even hijack computers. Read our infographic to learn about the different types of malware.

Read More

malware removal

How To Remove Malware From Your Website

When you think of websites being infected with malware, what types of sites come to mind? Pharmaceutical sites, porn sites or sites that bombard you with pop-up ads? While these sites could very well be malicious, you’re actually more likely to run into malware while visiting one of your typical, everyday e-commerce or news sites. Today, 75 percent of legitimate websites are at risk of malware. Malware, also known as malicious software, is designed to harm a website and its visitors.

Read More

Page 1 of 5

Powered by WordPress & Theme by Anders Norén