Quttera | BLOG

A blog about real-life cybersecurity attacks, web malware and how to protect your website and online business from cybercriminals.

Staying on top of website security regulations is now more important than ever. Find out about GDPR and what it means for your business and customers’ privacy.

Read more →

While malicious SEO Spam malware infections were starting to drop, recent activity indicates that they are on the climb again. Let’s look at this threat, why it is serious, and how you can be better protected.

Read more →

Because WordPress is so widely used, it’s often a target for hackers. One in particular, known as the ‘pharma hack,’ has been affecting many users lately. Read on to learn more about WordPress pharma hacking, and what you can do to protect your website.

Read more →

The more control you have over the website, the more you need to think about keeping it safe. Website malware monitoring and protection software are key defenses for keeping intruders out.

Read more →

How sure are you that your confidential information is safe with the domain that you are using? Know the signs to evaluate website security in order to better understand how your information is protected.

Read more →

A few days ago, the download counter of the WordPress Malware Scanner plugin passed 400K installations--and with good reason. This incredible plugin has a number of key advantages that have helped many of our customers build their websites and create the amazing online communities they've hoped for. We have been happy to provide the Malware Scanner for free to the WordPress community throughout its lifetime. It helps monitor malware and blacklisting to create safer websites for both owners and users.

Read more →

Malicious redirect to another URL is nothing new, but how you redirect, that is the big question. The most popular type of the redirect infection that our incident response team handled last year was implemented through themes and plugins. Since we keep receiving more customers getting infected with this type of redirection, we decided to make a short post about it. So how does this new type of redirection work?

Read more →

CryptoJacking is the unauthorized use of your device to mine digital currency. The number of the cryptocurrency malware infections that we handle has significantly increased since fall 2017. You may want to check our latest posts on the new trends in the cryptocurrency mining malware that has exploded in popularity among the hackers: Crypto Mining Malware on Popular Code Repositories Bitcoin Mining Using Visitors' Machines The good news is that CryptoJacking has already been deemed malicious by the cybersecurity industry and has also been agreed to be put in the same category as malware.

Read more →

Cryptocurrency mining malware is gaining popularity among hackers. Attackers are now using GitHub repositories and other well-known repositories for storing and serving the malicious code. On GitHub, the free accounts are being created to commit the obfuscated code and to use it in the injection later. The encrypted infection usually disguises itself as a legitimate jQuery or other familiar library files. It looks like in 2018 this new security threat - cryptojacking is here to stay.

Read more →

Brute-force attacks are a significant portion of the modern web server attack landscape, and the goal of these attacks is to gain access to content management system (CMS) dashboards by guessing admin usernames and passwords. After access has been achieved, hackers gain full control of the compromised website and can use it to send spam, inject malicious JavaScript code into a database, or just redirect all visitors to a third-party resource to generate traffic (also known as traffic hijacking).

Read more →

Background Only a few days ago, we released a write up about hackers using compromised websites for bitcoin mining. Just recently we responded to another hacking incident that uses the website visitor’s computer for bitcoin mining. Bitcoin mining is primarily a means of earning commission on bitcoin transactions. Here is a simplistic explanation of what bitcoin mining is and why hackers want to use your site’s visitors' computers. Each time a bitcoin is bought, traded or sold a record of the transaction must be created.

Read more →

In our recent post about anti-malware myths, we spoke of visitor dependent malware. Three of the methods used to identify which visitors to attack and which to hide from are geolocation awareness, IP address awareness, and language awareness. Malware and phishing content hidden on a business’s website may infect or ignore visitors from some locations but not others. This behavior can help malware to hide on a compromised website for weeks, months, or even years.

Read more →

Protecting Your Online Success with Anti-Malware for Websites ThreatSign users represent almost every industry out there. They are doing a great job, each one in their domain of expertise, in creating products and services that change the lives of their clients making them better. Assistive software solutions that help people with dyslexia and dysgraphia in their struggle to read and write, a biotech company researching new medicines, resort boutiques, healthcare services, and the list goes on.

Read more →

Public Computers, Malware, and I Never Thought I Would Find Malware There! Name seven places where you might find public computers. Let me see if I can guess what you came up with. Hotels, libraries, airports, coffee shops, job search assistance locations, schools, and conference facilities. Let me add one more; the microphone. Let's begin with the realization that some public computers are open to all or mostly all of the public, but even those that have restrictions on who can use them are still public computers.

Read more →

Introduction Bitcoin is a digital currency that has been around since 2008 but was released in 2009. Recently, it has been gaining popularity because of the increasing number of merchants that are accepting bitcoins as a form of payment. Current Bitcoin exchange rate to USD is off the charts and is still climbing higher. How Hackers Use Your Website For BitCoin Mining? One of the ThreatSign customers has recently asked us to monitor their website as they were experiencing high CPU usage.

Read more →

This is not just another phishing attack blog. This is about your business’ well-being should your website be compromised. This about hosting providers who may inadvertently allow multiple client’s websites to be compromised simultaneously, thereby putting their own business at risk. This is about protecting reputations and maintaining accessibility to your website or to the websites that you host. Janet Evans is an American swimmer who won four Olympic gold medals and one silver medal.

Read more →

Ransomware Cyber-Attack Threat A continually improving ransomware attacks is a challenge that IT companies, online businesses, health trusts and even governments are facing. In a short-term, ransomware infection blocks access to essential files on computer or server for weeks and months. Such cyber security incident is dangerous for daily business operation knocking out successful businesses until the hacking recovery. While in long-term, ransomware infection has severe consequences striking business's reputation and leading to commercial and financial collapse.

Read more →

Introduction During recent phishing incident handled by ThreatSign incident response team, a phishing link lead to a discovery of the Phishing Kit. The prompt actions allowed to mitigate the threat and avoid its distribution in the wild. Let's skip the attack background and head to the Phish Kit details: Office 365 PhishKit MD5: b46a0a1035e49e2e9e0218ebbd97fffe The file is a zipped file that contains the whole directory of the phishing kit. Upon loading the files on a web server it shows a familiar Office 365 login page: Upon entering fictional credentials, the fake Office login page made the following requests:

Read more →

Introduction Typically, Backdoor malware is one of the initial stages of the cyber attack. Hackers find vulnerabilities on the site and upload arbitrary files (in this case a Backdoor) to your site and then access it via browser. This is how a plain old Backdoor looks like: For more information about a Backdoor: FilesMan Backdoor Malware On Your Computer Using Legitimate Code Wrappers To Avoid Detection By The Web Malware Scanners The above-mentioned type of backdoor has identifiable signatures which are distributed among the security vendors and then utilized in the traditional (signature-based) detection algorithms.

Read more →

Introduction In the last few days we received lots of JavaScript infection related to page redirection. One of the most common techniques is an inserted JavaScript that targets WordPress CMS. The attacker inserts the link, hxxs://traffictrade[.]life/scripts.js on each page. This link then redirects the visitors to your site to the https://redirect[.]trafficreceiver.club/landing/ where they will see the malicious pop-ups. The interesting part is, there were no infected files on customer's site. The only sign is the code injected into the 'wp_options' table inside the database.

Read more →

Malware clean-up and hacking recovery for websites

Get your website cleaned and removed from blacklists. Prevent traffic loss and protect your visitors now.

Emergency

$249

/ yr

1 Website
Initial Response Time
within 4 hrs.
Manual Malware Removal / Full Website Audit
Blacklisting removal
Web Application Firewall (DNS-based WAF or Endpoint WAF)
Virtual Patching and website hardening
Free SSL Certificate with the DNS-based Web Application Firewall
all features...
Create Account
Essential Security

$10

/ mo

1 Website
Initial Response Time
within 12 hrs.
Web Application Firewall (DNS-based WAF or Endpoint WAF)
Virtual Patching and website hardening
Free SSL Certificate with the DNS-based Web Application Firewall
External & Internal Malware Scanning
all features...
Create Account

more plans

Need help? contactus@quttera.com

Newsletter

Join our mailing list to receive free email updates