Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Attackers Target Neglected Websites to Go Phishing
Facebook   X   LinkedIn   Email

Attackers Target Neglected Websites to Go Phishing

March 6, 2025

According to a recent study by Kaspersky, there is a growing trend of attackers focusing on abandoned and minimally maintained websites for the purpose of hosting very legitimate-looking phishing pages. In fact, the research revealed a significant volume of compromised websites. Between mid-May and the end of July, it identified 22,400 distinct WordPress websites that had been compromised by threat actors to serve as platforms for hosting phishing pages.

The preference for targeting such websites is underscored by the researchers' observation that phishers are increasingly drawn to WordPress sites. This may be attributed to the considerable number of known vulnerabilities in this widely adopted content management system and its associated plugins. W3Techs reported that 43.1% of all websites have the WordPress content management system behind them.

The range of compromised websites encompasses instances where attackers easily accessed control panels due to inadequate security measures, as well as those where unauthorized entry required exploiting vulnerabilities, stealing credentials, and employing various other tactics. Notably, Kaspersky detected 200,213 user attempts to access phishing pages that were being hosted on these compromised websites.

Neglected domains also appear to be attractive to attackers due to the extended duration that phishing pages can remain active on them. This is important to note, especially considering the relatively brief lifespan of phishing pages in general.  A Kaspersky report from December 2021 stated that 33% of phishing pages became inactive within just a single day of being deployed. The same report noted finding 5,307 phishing pages, with 1,784 of those ceasing to function after the first day. In addition, a substantial number of them became inactive within the initial few hours of going up. Ultimately, half of the pages examined in the study disappeared within 94 hours of their creation.

What does this mean to you? Well, phishing is obviously prominent and new ways of doing it continue to appear. It’s important to always be on the lookout for all types of phishing lures. As we now know, phishing can come by way of email messages, texts and SMS, voice calls and voice-to-text messages, as well as via websites, advertising, and just about any way you can think up. And any type of attachment or link can be dangerous, including images.

Keep in mind a few clues:

  • Blurry graphics and texts
  • Mistakes in spelling and grammar
  • Websites that are not secure (do not have the “https” at the beginning)
  • Misspelled website names. Watch closely for a number 1 in place of a lowercase “L”, for example

Remember never to click links or attachments in messages that you are not sure are safe, come from unknown senders, or are not expected. Also, bookmark your frequently visited and trusted websites rather than typing them and risking making typos.

If you have a website you manage, be sure to keep it updated at all times with the latest patches. This will limit the opportunities criminals have to take advantage of known vulnerabilities.

And if you have a webpage, whether for business or personal use and are no longer using it, just remove it so it’s not left for a hacker to use against us all.


WhatsApp Worm Spreads To Other Apps, Malware Hides in .BMP Images

Scams & Phishing

WhatsApp Worm Spreads To Other Apps, Malware Hides in .BMP Images

It’s a cyber jungle out there. It’s a sort of “survival of the fittest” and those in-the-know can help keep themselves from becoming a casualty of these cybercrimes. An investigation by Malwarebytes found that cybercriminals are now circulating malware via bitmap (.bmp) images to add to the ever increasing list of file types that can no longer be trusted, such as .doc, .xls, and .exe. Now, even clicking that funny cat picture may leave our devices infested with dangerous worms, Trojans, and perhaps ransomware. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

When What You See Is Not What You Get

Corporate Security

When What You See Is Not What You Get

Although it may sound strange, bad actors are exploiting what we see – or what we think we see. Always looking for new ways to gain our confidence, cybercriminals are counting on us being human to make this con work. Trust, fear, and concern are some of the emotions being exploited, which is nothing new for hackers. But what is new is taking advantage of our assumption that when we see a trusted website, it’s worthy of our trust…Well, maybe not so much anymore. READ FULL STORY

Gootloader Grazes Legitimate Websites For Victims

Your Security

Gootloader Grazes Legitimate Websites For Victims

When it comes to damaging malware, Gootloader has made a name for itself. This is largely due to the impact it can have on some of the largest businesses in the world. But don’t think for even a second that it can only affect large companies. Any sized organization can fall victim to this or any other type of malware. Recently, it’s been law and accounting firms that are those targets. Gootloader is a Javascript-based framework that has been used to steal sensitive data in the past. READ FULL STORY

GoDaddy’s Three-Year-Long Breach – 1+ Million WordPress Users Affected

Corporate Security

GoDaddy’s Three-Year-Long Breach – 1+ Million WordPress Users Affected

It’s a fact that corporate data breaches happen much more often than we know about. And then there are data breaches in a category of their own, like the one discovered at GoDaddy earlier this year. The popular web hosting company announced among their data breach findings, that 1.2M of their Managed WordPress customers were affected. GoDaddy found the three-year-long breach began in March 2020 with a successfully phished employee password. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...