East Asian Websites Hijacked by Widespread Cyberattack And Redirected to Adult Sites

East Asian Websites Hijacked by Widespread Cyberattack And Redirected to Adult Sites

Since the beginning of September 2022, thousands of websites targeted at East Asian audiences have been compromised by a large-scale malicious cyber operation that directs users to adult-themed content. The continuing attack involves connecting to the target web server using valid FTP credentials that the threat actor had previously obtained via an undisclosed manner, then inserting malicious JavaScript code into the compromised websites.

“In many cases, these were highly secure auto-generated FTP credentials which the attacker was somehow able to acquire and leverage for website hijacking,” Wiz said in a recently-published report.

The cloud security company stated that it has been challenging to identify a common attack vector since the compromised websites—owned by both small businesses and large corporations – use various tech stacks and hosting service providers. After all of that, one of the things websites have in common is that most of them are either hosted in China or are hosted in another nation but are optimized for Chinese users.

Additionally, the geofenced URLs housing the malicious JavaScript code prevent its execution in specific East Asian nations. There are additional hints that the campaign is targeting Android since the redirection script sends users to gambling websites where they are urged to download an app (APK package name “com.tyc9n1999co.coandroid“).

Although the threat actor’s identity is currently unknown and their exact objectives have not been established, it is believed that they are attempting to engage in ad fraud and SEO manipulation or, alternatively, send inorganic traffic to these websites. The attacks’ lack of phishing, online skimming, or malware infection is another noteworthy feature. 

Researchers Amitai Cohen and Barak Sharoni said they are still unaware of how the threat actor has been getting initial access to so many websites. They have not yet found any notable similarities among the compromised servers besides the fact that they all use FTP. Given the attack’s apparent lack of complexity, it is doubtful that the threat actor is employing a 0-day vulnerability, but they can’t completely rule it out.

About the author

Yehudah Sunshine

Yehudah Sunshine

Bringing together his diverse professional cyber know-how, intellectual fascination with history and culture, and eclectic academic background focusing on diplomacy and the cultures of Central Asia, Yehudah Sunshine keenly blends his deep understanding of the global tech ecosystem with a nuanced worldview of the underlying socio-economic and political forces which drive policy and impact innovation in the cyber sectors. Yehudah's current work focuses on how to create and or opportunities enhance marketing strategies and elevate cyber driven thought leadership for cyfluencer (www.cyfluencer .com), the cybersecurity thought leadership platform. Sunshine has written and researched extensively within cybersecurity, the service sectors, international criminal accountability, Israel's economy, Israeli diplomatic inroads, Israeli innovation and technology, and Chinese economic policy.

Share: