When investigating a compromised website, our team has to make sure that all malware and backdoors are cleared from the environment. In some instances, these…
During our malware research role, we analyze hundreds (if not thousands) of malware samples every day. Quite often, highly-obfuscated techniques are used by attackers to…
When a website is compromised, one of the most interesting and challenging tasks we perform is identifying all malware to prevent attackers from regaining access…
We’ve already described several times how credit card stealing malware hides a data collecting script behind an image URL. When people see URLs that end…
Some website hacks aim to make some political statements. Defacements are well known for this. Some infections redirect visitors to scam sites that push (usually…
Some attackers seem to like signing their scripts. This fact is especially true for defacements and backdoors, where attackers show their pride stating that they…
After carefully designing a theme and images that represent your brand, nothing is worse than seeing a malicious image suddenly associated with your business or…
We’ve been watching a specific WordPress infection for several months and would like to share details about it. The attacks inject malicious JavaScript code into…