Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » jQuery.com compromised to serve malware via drive-by download

jQuery.com compromised to serve malware via drive-by download

2014/09/23

Help Net Security - (International) RiskIQ researchers found and reported that jQuery.com, the official Web site of the cross-platform JavaScript library of the same name, was compromised and redirected its visitors to a site hosting the RIG exploit kit and delivered information-stealing malware. The attack was discovered September 18 and the site's administrators removed the malicious script.

Source: http://www.net-security.org/malware_news.php?id=2869

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:48