Black Lotus Labs, a division specializing in threat intelligence at Lumen Technologies that focuses on identifying malware and cyber security threats, has announced the discovery of a group of compromised websites that have been used in watering hole attacks in the past. All visitors who browse one of the sites would be unknowingly infected and vulnerable to the attacker stealing a copy of their Windows authentication credentials that could be used to impersonate them. The activity was only recently brought to light and was discovered on several Ukrainian and one Canadian website. These attacks target websites by inserting a malicious function into the website’s code, which is then executed by the victim’s machine. This type of attack has been used for many years, including the high-level compromise that was traced to the San Francisco International Airport website in April 2020. When analyzing the attacks in Ukraine and Canada,…
Latest Posts:
- Darryll Dewan Unveils Top Data Center Trends for 2024
- Telecom Operators Leverage Satellite Tech for 5G Expansion, Market Growth Yet to Surge
- Web O.No: Metaverse and Web 3.0 Stunted by Internet Chaos, Warn 87% of Business Leaders
- Nokia to Deploy First 5G Standalone Network in Uzbekistan
- Navigating US Senate Regulations: TikTok’s ByteDance Dilemma
- Unraveling the Impact of KKR’s Acquisition on Italy’s Telecom Sector
- Vodafone Launches Scam Signal API to Combat Impersonation Fraud
- DIDWW expands its Emergency Calling services to the Czech Republic, Switzerland and Hong Kong
- Macquarie Explores Exit as Competition Intensifies in UK Altnet Market
Tag