Feeds

Creditsafe suspends website in wake of drive-by download attack

Precautionary disconnect

The Power of One eBook: Top reasons to choose HP BladeSystem

UK credit reference and credit recovery agency creditsafe.co.uk took its site offline on Tuesday, as a precaution, following a hacking attack. The site remains offline at the time of writing on Wednesday afternoon.

Miscreants planted malicious code on Creditsafe Limited's1 website. This code had the effect of redirecting surfers to a hacker controlled website that attempted to drop malware onto the PCs of surfers, likely using unlatched browser exploits or similar methods

Hackers often plant malicious code on legitimate sites as part of so-called drive-by download attacks. In the case of Creditsafe, the attack spawned concerns that its email and internal systems might also have been compromised.

The possibility that customers' personally identifiable information was also exposed was quickly discounted. Following a review, creditsafe concluded that its internal systems were also safe.

In a statement on its site, Creditsafe said it planned to restore its website to normal as soon as possible. A representative of the firm told El Reg that it hoped to restore the site either later on Wednesday afternoon or on Thursday. The initial attack itself remains under investigation, and it's not clear what kind of malware was been punted via the assault.

Creditsafe promises to update the status of its site via its Twitter feed.

Although Creditsafe's action disrupted its business it was wise to take its website offline while it established the scope of the breach against its systems. Consumers, in general, are more sensitive to the leak of personal information following high-profile breaches involving Sony, marketing outfit Epsilon and others over recent weeks.

Oddly these incidents seem to have more of an effect than hacks that exposed credit card details and resulted in fraud to customers of TJX and Heartland in previous years.

Firms in the financial service sector, in particular, need to be especially risk-averse, assuming the worst for the sake of their customers - as well as their own longer-term reputations.

1 Creditsafe Limited should not be confused with Creditsafe Business Solutions Limited, a separate firm unaffected by the security flap affecting its near-namesake.

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.