LA Times Subdomain Directed Readers to Malware at least six weeks, a subdomain for the Los Angeles Times was redirecting visitors to a separate domain hosting the Blackhole Exploit Kit. The story was broken by Brian Krebs, and confirmed by both the news organization and security firm Avast.

According to Krebs’ article, Avast confirmed reports sent to him by his readers that the Wheels and Deals subdomain on the LA Times portal was compromised. Avast was able to determine that the domain has been hijacked since before Christmas, serving visitors up to the malware Gods for more than six weeks.

According to traffic data, the “Wheels and Deals” section of the LA Times could have exposed more than 300,000 people to the Blackhole Exploit Kit, but the exact number of compromised users is unknown.

Shortly after Krebs broke the story, the LA Times issued a statement:

“On February 6th the Los Angeles Times was made aware that malware was possibly being served by We quickly determined the problem was contained within the Offers & Deals sub-domain, which is maintained by a third party. Our forensics team undertook what is now an ongoing investigation and is working closely with the vendor to collect evidence surrounding the event.

“To ensure safety, the Offers & Deals platform has been rebuilt and further secured. The sub-domain generates only advertising content and does not contain any customer information. As a trusted source of news and information, The Times takes matters of internet security very seriously and are pleased to report that there is no malware currently detectable on Offers & Deals.”

Around the time that the LA Times was targeted, SecurityWeek published a report surrounding research from Sophos, who said that Blackhole Exploit Kit attacks will continue blanket the Web.

More than 80 percent of attacks in 2012 were redirects (similar to the one discovered on the LA Times), and the majority of those redirects were from legitimate sites that had been hacked, Sophos found in its Security Threat Report for 2013. According to their data, the Blackhole Exploit Kit accounted for 27 percent of exploit sites and redirects in 2012. Sophos predicted more premium features, such as scriptable Web services, APIs, and malware quality assurance platforms, will be built-into Blackhole for even more complex attacks.

via LA Times Subdomain Directed Readers to Malware | SecurityWeek.Com.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of the author. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided "as-is". The author shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: