And it it still defaced (for more than couple of hours).
Link http://www.airforce.gov.au/.
Snapshot:
You May Also Like
Examining Unique Magento Backdoors
- August 4, 2021
During a recent investigation into a compromised Magento ecommerce environment, we discovered the presence of five different backdoors that would provide attackers with code execution…
Fake Volkswagen Campaign Spreads Through Social Networks
- December 7, 2018
We recently investigated a suspicious link received by one of my colleagues on WhatsApp. The message (in Portuguese) states that Volkswagen is offering 20 free…
Cloudflare[.]solutions Keylogger Returns on New Domains
- January 24, 2018
A few months ago, we covered two injections related to the “cloudflare.solutions” malware: a CoinHive cryptominer hidden within fake Google Analytics and jQuery, and the…
Arbitrary Directory Deletion in WP-Fastest-Cache
- March 18, 2019
The WP-Fastest-Cache plugin authors released a new update, version 0.8.9.1, fixing a vulnerability (CVE-2019-6726) present during its install alongside the WP-PostRatings plugin. According to seclists.org:…
A Quick Glance at Cross-Origin Resource Sharing Security Headers
- October 21, 2020
Thanks to the rapid growth of JavaScript frameworks such as Angular, Vue, and React, CORS has become a popular word in the developer’s vocabulary. When…
New Guide on the Sucuri Referral Program
- May 11, 2019
Referral programs and affiliate marketing opportunities can be found on many web-based company sites, however, often they’re overlooked. Commonly people consider these programs as something that…
Vulnerabilities Digest: March 2020
- March 27, 2020
Fixed Plugins and Vulnerabilities Plugin Vulnerability Patched Version Installs Cookiebot Reflected Cross-Site Scripting 3.6.1 40000 Data Tables Generator By Supsystic Authenticated Stored XSS 1.9.92 30000…
How To Find & Remove Malware on Weebly Sites
- January 5, 2023
Weebly is an easy-to-use website builder that allows admins to quickly create and publish responsive blogs and sites. Website builder environments are usually considered to…
The Dangers of Using Abandoned Plugins & Themes
- December 17, 2020
It’s not very often that we see abandoned components being used on a website — but when we do, it’s most often because the website…
Steps to Keep Your Site Clean: Access Points
- March 13, 2018
Unfortunately, most website owners know what it’s like to have a site hacked – the panic, the rush to find anyone out there that can…









3 comments
holy shit… is that for real??
WTF………does India support hacking other government's sensitive websites ? I guess not !
well done…those bastards needed this lesson…hope this will be an eye-opener for them
Comments are closed.