Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

LA Times Subdomain Directed Readers to Malware

For at least six weeks, a subdomain for the Los Angeles Times was redirecting visitors to a separate domain hosting the Blackhole Exploit Kit. The story was broken by Brian Krebs, and confirmed by both the news organization and security firm Avast.

For at least six weeks, a subdomain for the Los Angeles Times was redirecting visitors to a separate domain hosting the Blackhole Exploit Kit. The story was broken by Brian Krebs, and confirmed by both the news organization and security firm Avast.

According to Krebs’ article, Avast confirmed reports sent to him by his readers that the Wheels and Deals subdomain on the LA Times portal was compromised. Avast was able to determine that the domain has been hijacked since before Christmas, serving visitors up to the malware Gods for more than six weeks. 

According to traffic data, the “Wheels and Deals” section of the LA Times could have exposed more than 300,000 people to the Blackhole Exploit Kit, but the exact number of compromised users is unknown.

Shortly after Krebs broke the story, the LA Times issued a statement:

“On February 6th the Los Angeles Times was made aware that malware was possibly being served by OffersandDeals.latimes.com. We quickly determined the problem was contained within the Offers & Deals sub-domain, which is maintained by a third party. Our forensics team undertook what is now an ongoing investigation and is working closely with the vendor to collect evidence surrounding the event.

“To ensure safety, the Offers & Deals platform has been rebuilt and further secured. The sub-domain generates only advertising content and does not contain any customer information. As a trusted source of news and information, The Times takes matters of internet security very seriously and are pleased to report that there is no malware currently detectable on Offers & Deals.”

Around the time that the LA Times was targeted, SecurityWeek published a report surrounding research from Sophos, who said that Blackhole Exploit Kit attacks will continue blanket the Web.

More than 80 percent of attacks in 2012 were redirects (similar to the one discovered on the LA Times), and the majority of those redirects were from legitimate sites that had been hacked, Sophos found in its Security Threat Report for 2013. According to their data, the Blackhole Exploit Kit accounted for 27 percent of exploit sites and redirects in 2012. Sophos predicted more premium features, such as scriptable Web services, APIs, and malware quality assurance platforms, will be built-into Blackhole for even more complex attacks.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Jared Bartel has been named CISO at Idaho State University.

Automated phishing protection and scam prevention company Bolster has appointed Rod Schultz as CEO.

Bugcrowd has appointed Trey Ford as CISO for the Americas.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.