Feeds

Link spammers set up shop on GMTV sofa website

Breakfast station briefly pwned after domain name snafu

High performance access to file storage

The website of breakfast TV station GMTV was colonised by spammers over the weekend after its domain lapsed.

Enough to make you choke on your cornflakes

Instead of offering information on presenters or topics to be covered on the show the site became a showcase for links to dating and debt consolidation websites. GMTV - best known for its brightly coloured sofa-filled set and bland interviews conducted with celebrities by Lorraine Kelly - became a link farm for spammers after its domain came up for grabs.

Reg readers were quick to tell us about the problem, which initially appeared to be a simple web defacement. Normality returned after GMTV's webmaster flashed the plastic and renewed the web site's registration. The site has since been restored to full health.

Security watchers at Sophos did not register any spam as a result of the ruse, which was quickly nipped in the bud. The GMTV website was infected by the BadSrc-C strain of malware on 10 August, Sophos said, but that seems unrelated to its more recent problems.

GMTV's techies acknowledge our request for comment but said that the person who handled the issue was tied up. We have heard nothing more back at time of writing.

GMTV has held the breakfast TV franchise for the main commercial channel (ITV1) in the UK since 1993. An estimated 5 million Brits tune in every morning to watch the magazine-style soft news program made up of interviews, chat, news bulletins and quizzes. The station was fined £2m last year by regulators after it emerged that the winners of some competitions were selected before phone lines closed, leaving thousands of punters shelling out to enter competitions they had no chance of winning. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.