Yesterday, hackers compromised the website of the Jerusalem Post by planting malicious coding into the website so that it would distribute malware to visitors. A researcher at Sophos Labs was one of the first to find the exploit.
“Initially, I suspected that the malware was loaded via a compromised advert stream or one of the popups from the site,” writes Paul Baccas, a virus researcher with Sophos. “However, upon further investigation there were the tell-tale signs of hackers at work on the main site.”
While some might assume that this is the in response to increased tensions in the Middle East, Baccas said that it is unlikely in this case.
“In the current climate some will assume that the site has been hacked by a politically motivated hacker,” he writes. “However, in my experience the majority of hacks like this are done via a scattergun approach and it was just bad luck (and bad website security) that meant that the Jerusalem Post was the victim.”