Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Website. Show all posts

The Cookie Problem. Should you Accept or Reject?


It is impossible for a user today to surf the internet without cookies, to reject or accept. A pop-up shows in our browser that asks to either “accept all” or “reject all.” In a few cases, a third option allows you to ‘manage preferences’.

The pop-ups can be annoying, and your first reaction is to remove them immediately, and you hit that “accept all” button. But is there anything else you can do?

About cookies

Cookies are small files that are saved by web pages, and they have information for personalizing user experience, particularly for the most visited websites. The cookies may remember your login details, preferred news items, or your shopping preferences based on your browsing history. Cookies also help advertisers target your browsing behaviour via targeted ads. 

Types of cookies

Session cookies: These are for temporary use, like tracking items in your shopping cart. When a browser session is inactive, the cookies are automatically deleted.

Persistent cookies: As the name suggests, these cookies are used for longer periods. For example, saving logging details for accessing emails faster. They can expire from days to years. 

About cookie options

When you are on a website, pop-ups inform you about the “essential cookies” that you can’t opt out of because if you do, you may not be able to use the website's online features, like shopping carts wouldn’t work. But in the settings, you can opt out of “non-essential cookies.”

Three types of non-essential cookies

  1. Functional cookies- Based on browsing experience. (for instance, region or language selection)
  2. Advertising cookies- Third-party cookies, which are used to track user browsing activities. These cookies can be shared with third parties and across domains and platforms that you did not visit.
  3. Analytics cookies- They give details about metrics, such as how visitors use the website

Hackers Are Spreading Malware Through SVG Images on Facebook


The growing trend of age checks on websites has pushed many people to look for alternative platforms that seem less restricted. But this shift has created an opportunity for cybercriminals, who are now hiding harmful software inside image files that appear harmless.


Why SVG Images Are Risky

Most people are familiar with standard images like JPG or PNG. These are fixed pictures with no hidden functions. SVG, or Scalable Vector Graphics, is different. It is built using a coding language called XML, which can also include HTML and JavaScript, the same tools used to design websites. This means that unlike a normal picture, an SVG file can carry instructions that a computer will execute. Hackers are taking advantage of this feature to hide malicious code inside SVG files.


How the Scam Works

Security researchers at Malwarebytes recently uncovered a campaign that uses Facebook to spread this threat. Fake adult-themed blog posts are shared on the platform, often using AI-generated celebrity images to lure clicks. Once users interact with these posts, they may be asked to download an SVG image.

At first glance, the file looks like a regular picture. But hidden inside is a script written in JavaScript. The code is heavily disguised so that it looks meaningless, but once opened, it runs secretly in the background. This script connects to other websites and downloads more harmful software.


What the Malware Does

The main malware linked to this scam is called Trojan.JS.Likejack. Once installed, it hijacks the victim’s Facebook account, if the person is already logged in, and automatically “likes” specific posts or pages. These fake likes increase the visibility of the scammers’ content within Facebook’s system, making it appear more popular than it really is. Researchers found that many of these fake pages are built using WordPress and are linked together to boost each other’s reach.


Why It Matters

For the victim, the attack may go unnoticed. There may be no clear signs of infection besides strange activity on their Facebook profile. But the larger impact is that these scams help cybercriminals spread adult material and drive traffic to shady websites without paying for advertising.


A Recurring Tactic

This is not the first time SVG files have been misused. In the past, they have been weaponized in phishing schemes and other online attacks. What makes this campaign stand out is the combination of hidden code, clever disguise, and the use of Facebook’s platform to amplify visibility.

Users should be cautious about clicking on unusual links, especially those promising sensational content. Treat image downloads, particularly SVG files with the same suspicion as software downloads. If something seems out of place, it is safer not to interact at all.

HPU Website Defaced in Cyberattack, Investigation Underway

 



Shimla, June 10 — The official website of Himachal Pradesh University (HPU) experienced an unexpected breach earlier this week, when its homepage was briefly altered to display inappropriate and anti-national content. The incident prompted immediate action, with the university taking the website offline to prevent further misuse.

Authorities confirmed that unidentified individuals had gained access to the homepage, where they replaced the usual university interface with content that included offensive language and visuals critical of national values. While the site was swiftly removed from public view for technical checks and repairs, no formal complaint had been filed by university officials at the time of reporting.

In response to the cyber intrusion, law enforcement has begun a preliminary investigation. A senior police official confirmed that two cybercrime specialists will visit the university on Tuesday. Their role will be to examine how the breach occurred, gather digital evidence, and determine the extent of the incident. They will also review the university’s existing cybersecurity framework to help prevent similar attacks in the future.

Although there has been no indication that internal systems or user data were compromised, the defacement itself raises concerns about the digital safety of public institutions. Experts note that universities, while not typical targets of large-scale cybercrime, are still vulnerable due to often limited technical infrastructure and cybersecurity awareness.

Incidents like this are typically aimed at spreading propaganda or drawing attention through disruption. They also highlight the urgent need for academic institutions to invest in stronger online defenses, including regular system audits, software updates, and basic cyber hygiene practices.

The university’s website is expected to be restored after thorough security checks are completed. Authorities have assured that any future developments in the investigation will be made public through official channels.

As cyber threats grow more frequent and intricate, this incident stands as a reminder of the importance of proactive digital security, even in the education sector.



Think Twice Before Using Text Messages for Security Codes — Here’s a Safer Way

 



In today’s digital world, many of us protect our online accounts using two-step verification. This process, known as multi-factor authentication (MFA), usually requires a password and an extra code, often sent via SMS, to log in. It adds an extra layer of protection, but there’s a growing concern: receiving these codes through text messages might not be as secure as we think.


Why Text Messages Aren’t the Safest Option

When you get a code on your phone, you might assume it’s sent directly by the company you’re logging into—whether it’s your bank, email, or social media. In reality, these codes are often delivered by external service providers hired by big tech firms. Some of these third-party firms have been connected to surveillance operations and data breaches, raising serious concerns about privacy and security.

Worse, these companies operate with little public transparency. Several investigative reports have highlighted how this lack of oversight puts user information at risk. Additionally, government agencies such as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have warned people not to rely on SMS for authentication. Text messages are not encrypted, which means hackers who gain access to a telecom network can intercept them easily.


What Should You Do Instead?

Don’t ditch multi-factor authentication altogether. It’s still a critical defense against account hijacking. But you should consider switching to a more secure method—such as using an authenticator app.


How Authenticator Apps Work

Authenticator apps are programs installed on your smartphone or computer. They generate temporary codes for your accounts that refresh every 30 seconds. Because these codes live inside your device and aren’t sent over the internet or phone networks, they’re far more difficult for criminals to intercept.

Apps like Google Authenticator, Microsoft Authenticator, LastPass, and even Apple’s built-in password tools provide this functionality. Most major platforms now allow you to connect an authenticator app instead of relying on SMS.


Want Even Better Protection? Try Passkeys

If you want the most secure login method available today, look into passkeys. These are a newer, password-free login option developed by a group of leading tech companies. Instead of typing in a password or code, you unlock your account using your face, fingerprint, or device PIN.

Here’s how it works: your device stores a private key, while the website keeps the matching public key. Only when these two keys match—and you prove your identity through a biometric scan — are you allowed to log in. Because there are no codes or passwords involved, there’s nothing for hackers to steal or intercept.

Passkeys are also backed up to your cloud account, so if you lose your device, you can still regain access securely.


Multi-factor authentication is essential—but how you receive your codes matters. Avoid text messages when possible. Opt for an authenticator app, or better yet, move to passkeys where available. Taking this step could be the difference between keeping your data safe or leaving it vulnerable.

Critical Bug in E-commerce Website, Over 10000 Customers Impacted


WordPress plugin exploit

Cybersecurity experts have found a critical unpatched security vulnerability impacting the TI WooCommerce Wishlist plugin for WordPress that unauthorized threat actors could abuse to upload arbitrary files.

TI WooCommerce Wishlist has more than 100,000 active installations. It allows e-commerce website users to save their favorite products for later and share the lists on social media platforms. According to Patchstack researcher John Castro, “The plugin is vulnerable to an arbitrary file upload vulnerability which allows attackers to upload malicious files to the server without authentication.”

About the vulnerability 

Labeled as CVE-2025-47577, the vulnerability has a CVSS score of 10.0 (critical), it impacts all variants of the plugin below 2.92 released on November 29, 2024. Currently, there is no patch available. 

According to the security company, the issue lies in a function called "tinvwl_upload_file_wc_fields_factory," which uses another native WordPress function "wp_handle_upload" to validate but sets the override parameters “test_form” and “test_type” to “false.” 

The "test_type" override checks whether the Multipurpose Internal Mail Extension (MIME) file type is as expected, while the “test_form” verifies whether the $_POST['action'] parameter is correct. 

When setting "test_type," it permits the file type validation to escape effectively, permitting any file type to be uploaded. 

Reading the calendar

The TIWooCommerce Wishlist plugin is an extension for WooCommerce stores that lets users create and manage wishlists, sharing and saving their wishlist products. 

Apart from social sharing options, the plugin has AJAX-based functionality and multiple-wishlist support in the premium variant, email alerts, etc. 

Impact of attack

The scale of the potential attack surface is massive. A major concern is that these are ecommerce sites, where customers spend money, this can compound the risk. 

Currently, the latest variant of the plugin is 2.9.2, last updated 6 months ago. As the patch has not yet been released, concerned users are advised to deactivate and remove the plugin until a fix is issued.

The good thing here is that effective compromise is only possible on sites that also contain the WC Fields Factory plugin deployed and active, and the integration is active on the TI WooCommerce Wishlist plugin. This can make things difficult for threat actors. 

Unexpected 4Chan Downtime Leads to Cybersecurity Speculation

 


There has been a significant breach of security at 4chan recently, which has been widely reported. According to several online sources, a hacker may have managed to penetrate the platform's internal systems after successfully infiltrating the platform's anonymous and unmoderated discussions. This may represent the beginning of what appears to be a significant cybersecurity incident. 

Early reports indicate that the breach occurred when a section of the website that was inactive suddenly became active, displaying prominent messages such as "U GOT HACKED", a clear indication that the site had been hacked. This unexpected reactivation was the first indication that unauthorised access had been achieved. There was also growing speculation as a result of several online posts claiming the perpetrator behind the breach was leaking sensitive information, including personal information about the site moderators and their identities. 

The nature of the claims has sparked widespread concern about the possibility of data exposure and wider cybersecurity vulnerabilities for the platform, even though the platform has not yet released an official statement verifying the extent of the compromise. In this instance, it underscores the growing threat landscape facing digital platforms, particularly those that operate with minimal moderation and host large volumes of user-generated content, as the story unfolds. 

As cybersecurity experts and digital rights advocates continue to follow the story closely for confirmation and implications of the alleged breach, cybersecurity experts are closely monitoring developments. According to reports on social media platforms, 4chan was experiencing prolonged periods of downtime, which was widely reported by users across social media platforms, indicating the alleged breach of the website.

As of this writing, the website remains largely inaccessible. It appears that the disruption has been caused by a targeted and prolonged cyber intrusion, as suggested by independent observations, including those cited by TechCrunch. One user of a competing message board seemed to be revelling in the incident, with another claiming that the attacker had been able to use 4chan's systems for more than a year after gaining covert access through a user-created account. It is believed that numerous screenshots, purported to depict the administrative interface of the site, were circulated online as evidence of these claims. 

The images depicted what appeared to be internal tools and infrastructure, including moderation templates, user banning policies, and the source code of the platform, all of which would normally belong to the moderation team of the site. The most disturbing aspect of the leak has to do with a document that allegedly gives the identities of some 4chan moderators, as well as "janitors," who are users with limited administrative rights. 

In contrast to janitors, who are capable of removing threads and posts, moderators possess a more powerful set of capabilities, including the ability to view the IP address of users. This disclosure could have serious security and privacy implications if verified, especially given 4chan's history of hosting political, sometimes extreme content that is frequently unethical, oriented and extremist. 

Among other things, cybersecurity analysts warn that such a leak could compromise not only individual safety but could also give us a clearer picture of how one of the most polarising online communities functions. There have been reports of widespread service disruptions at 4chan, which were first reported early Tuesday, when thousands of users documented their experiences on Downdetector, a platform for monitoring website outages, reporting that 4chan's service has been disrupted. 

Since then, 4chan’s site has been intermittently accessible, with no official acknowledgement or explanations from its administrators, leaving a void that has quickly been filled by speculation. The narrative that has circulated, albeit unverified, points to a significant security breach. Multiple sources suggest that a hacker may have infiltrated the back-end infrastructure of 4chan and may be able to gain access to sensitive data, including moderator email addresses, internal communications and internal communications, among others. 

According to some users, the alleged vulnerability may be the result of outdated server software, which has been reported not to have been patched for more than a year. An even more detailed analysis was provided on the imageboard soyjack Party, a rival imageboard, where one user claimed the intruder had been able to access 4chan's administrative systems secretly for over a year. 

By these posts, the hacker eventually published portions of the platform's source code, as well as internal staff documentation, which led to a 4chan administrator taking it offline to prevent further exposure, as a result of the leak. As well as these allegations, many users on Reddit have shared screenshots of moderator login interfaces, private chat logs, as well as fragments of leaked code, as well as other claims that users echo. 

It is important to note that, while none of these allegations have been independently verified, cybersecurity professionals warn that if the breach is authentic, it can have serious repercussions for the site's operational security as well as the privacy of its users and employees. There has long been a reputation for 4chan as a place where controversial content is posted and politically sensitive discourse is conducted, and any breach of personal data, especially that of moderators, raises concerns about the possibility of identity theft, doxxing, and targeted harassment, as well as broader cyber exploitation. 

A definitive identification of the person responsible for the alleged 4chan breach has not been made yet, as conflicting reports and a lack of verifiable evidence continue to obscure the exact origins of the alleged attack. However, some emerging theories suggest that individuals connected with the Soyjak.party community, which is formally called the “Sharty” group, may have been involved in the incident. 

According to the allegations of these attackers, they are suspected to have exploited longstanding vulnerabilities in the backend architecture of 4chan, specifically outdated PHP code and deprecated MySQL functions, and gained access to a previously banned discussion board known as /QA/, as well as exposed some email addresses of the moderators of the platform. It remains unclear about the motives of the group. 

In recent weeks, certain users on X (formerly Twitter) have suggested that it might have been a retaliatory act resulting from the controversial removal of the /QA/ board in 2021. Although these assertions have been widely circulated, they have not been verified by credible sources. A comparison has also been made to previous breaches, including one which was revealed by 4chan's founder Christopher Poole in 2014, in which an attacker allegedly compromised moderator accounts due to his grievances. 

The incident at that time ended without any clarity as to who was responsible for the incident. It is clear that securing anonymous platforms, especially those that have a complex legacy and a volatile user base, continues to present several challenges, especially when layered with historical precedent and fresh suspicions. There will likely remain questions regarding accountability and intent until a formal investigation produces conclusive findings. 

It is likely, however, that if the breach is authenticated, it will significantly damage both 4chan's credibility and the privacy of its users. In addition to the possibility of exposing moderator emails and internal communications, leaked materials are allegedly showing evidence of deep system access, as well. According to these materials, user metrics, deleted posts and related IP addresses are exhibited alongside internal administrative documentation as well as portions of the platform's underlying source code assets. 

These materials, if genuine, may pose considerable security threats to users in the future. Even though WIRED is not able to independently verify the leaked content, there has been some controversy surrounding the situation since at least a few elements of the breach have been acknowledged as authentic by a moderator on the forum. Several concerns have been raised regarding 4chan's infrastructure since this incident, particularly allegations that the outdated and unpatched legacy software could have led to vulnerabilities ripe for exploitation. 

It is clear that these concerns have been around for nearly a decade; in 2014, following a previous security incident, the site's founder, Christopher Poole (also known as "moot"), made public a call for proactive measures in cybersecurity. In retrospect, it seems as though those early warnings went mostly unanswered. 

As a professor at the University of California Riverside who has a keen interest in digital discourse, online subcultures, and digital discourse, Emiliano De Cristofaro commented on the wider implications of the data breach, stating, “It seems that 4chan hasn’t been properly maintained in years,” he noted, noting that a failure to modernize and secure its infrastructure could now have exposed the site to irreversible consequences.

Hackers Exploit WordPress Sites to Attack Mac and Windows Users


According to security experts, threat actors are abusing out-of-date versions of WordPress and plug-ins to modify thousands of sites to trap visitors into downloading and installing malware.

In a conversation with cybersecurity news portal TechCrunch, Simon Wijckmans, founder and CEO of the web security company c/side, said the hacking campaign is still “very much live”.

Spray and pray campaign

The hackers aim to distribute malware to loot passwords and sensitive data from Mac and Windows users. According to c/side, a few hacked websites rank among the most popular ones on the internet. Reporting on the company’s findings, Himanshu Anand believes it is a “widespread and very commercialized attack” and told TechCrunch the campaign is a “spray and pray” cyber attack targeting website visitors instead of a specific group or a person.

After the hacked WordPress sites load in a user’s browser, the content immediately turns to show a false Chrome browser update page, asking the website visitor (user) to download and install an update to access the website, researchers believe. 

Users tricked via fake sites

When a visitor agrees to the update, the compromised website will ask the user to download a harmful malware file disguised as the update, depending on whether the visitor is a Mac or Windows user. Researchers have informed Automattic (the company) that makes and distributes Wordpress.com about the attack campaign and sent a list of harmful domains. 

According to TechCrunch, Megan Fox, spokesperson for Automattic, did not comment at the time of press. Later, Automattic clarified that the security of third-party plugins is the responsibility of WordPress developers.

“There are specific guidelines that plugin authors must consult and adhere to ensure the overall quality of their plugins and the safety of their users,” Ms Fox told TechCrunch. “Authors have access to a Plugin Handbook which covers numerous security topics, including best practices and managing plugin security,” she added. 

C/side has traced over 10,000 sites that may have been a target of this hacking campaign. The company found malicious scripts on various domains by crawling the internet, using a reverse DNS lookup to find domains and sites linked with few IP addresses which exposed a wider number of domains hosting malicious scripts. TechCrunch has not confirmed claims of C/side’s data, but it did find a WordPress site showing malicious content earlier this week.

Combatting Counterfeit Drugs Online: BrandShield's Success in Dismantling Illicit Websites

 

In the rapidly evolving landscape of online pharmaceuticals, the proliferation of counterfeit drugs poses a significant threat to consumer safety. Cybersecurity firm BrandShield has emerged as a stalwart defender in this battle, successfully dismantling over 250 websites selling counterfeit weight-loss and diabetes medications. Led by CEO Yoav Keren, BrandShield's efforts represent a concerted endeavor to combat the scourge of counterfeit pharmaceuticals and protect consumers from the dangers of fraudulent medications. 

The counterfeit drugs targeted by BrandShield predominantly belong to the GLP-1 class, including popular medications like Novo Nordisk's Ozempic and Wegovy, as well as Eli Lilly's Mounjaro and Zepbound. Originally developed to manage type 2 diabetes, these medications have garnered attention for their additional benefits in weight loss, with patients experiencing significant reductions in body weight. Unfortunately, the efficacy and popularity of these drugs have also made them lucrative targets for counterfeiters seeking to exploit the growing demand. 

According to Reuters, the majority of the illicit websites shut down by BrandShield were purveyors of counterfeit GLP-1 drugs, indicating the scale of the problem. Alarmingly, studies suggest that an estimated 95% of all online pharmacies operate unlawfully, highlighting the pervasive nature of the issue. 

Moreover, reported cases of harm linked to fake GLP-1 drugs have emerged in at least nine countries, underscoring the urgent need for action. BrandShield's recent crackdown on counterfeit drug websites represents a significant victory in the ongoing battle against online pharmaceutical fraud. The company's efforts have resulted in the closure of 90% of the identified pharmacy websites selling counterfeit GLP-1 medications. This operation accounts for just over 15% of the total counterfeit drug websites reported by BrandShield last year, emphasizing the scale of the challenge. 

Collaborating closely with the Pharmaceutical Security Institute (PSI), BrandShield employs rigorous evidence collection and intelligence gathering to identify and target illicit websites. By providing actionable intelligence to service providers hosting these websites, BrandShield facilitates their removal from the internet, effectively disrupting the operations of counterfeiters. Furthermore, the company coordinates with law enforcement agencies to investigate and prosecute criminal networks involved in the production and distribution of counterfeit drugs. 

In addition to targeting counterfeit drug websites, BrandShield's efforts extend to social media platforms, where it has removed nearly 4,000 fake drug listings. Notably, a significant portion of these listings—almost 60%—was found on Facebook, highlighting the need for vigilance across all online platforms. BrandShield's global reach ensures that illegal drug listings are eradicated from marketplaces in countries around the world, including India, Indonesia, China, and Brazil. 

Contrary to concerns raised earlier, the EMA found no evidence linking these medications to an increased risk of suicidal thoughts or self-injury. This reaffirmation of safety aligns with previous findings by the US Food and Drug Administration (FDA), providing reassurance to patients and healthcare providers alike. 

Overall, BrandShield's relentless efforts to combat counterfeit drugs online serve as a beacon of hope in the fight against pharmaceutical fraud. By dismantling illicit websites, removing fake drug listings, and collaborating with industry partners and law enforcement agencies, BrandShield is making significant strides towards safeguarding consumers and upholding the integrity of the pharmaceutical industry.