![]() On Sunday, November 1, CEO Sean Blanchfield addressed the incident with a blog entry accounting how the hack took place and the measures that were undertaken to mitigate damage caused by the breach. ![]() He wrote, “The attack was sophisticated and specifically targeted against PageFair, but it is unacceptable that the hackers could gain access to any of our systems. We identified the breach immediately, but it still took over 80 minutes to fully shut it down. ![]() During this time, visitors to websites owned by the publishers who have placed their trust in us were targeted by these hackers.”įollowing a spearphishing attack that gave hackers access to a key email account, a password reset was performed to hijack PageFair’s account via a Content Distribution Network (CDN) service used in serving the analytics’ Javascript tag. ![]() “They modified the CDN settings so that instead of serving PageFair's JavaScript, it served malicious JavaScript. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |