Feeds

Creditsafe suspends website in wake of drive-by download attack

Precautionary disconnect

Choosing a cloud hosting partner with confidence

UK credit reference and credit recovery agency creditsafe.co.uk took its site offline on Tuesday, as a precaution, following a hacking attack. The site remains offline at the time of writing on Wednesday afternoon.

Miscreants planted malicious code on Creditsafe Limited's1 website. This code had the effect of redirecting surfers to a hacker controlled website that attempted to drop malware onto the PCs of surfers, likely using unlatched browser exploits or similar methods

Hackers often plant malicious code on legitimate sites as part of so-called drive-by download attacks. In the case of Creditsafe, the attack spawned concerns that its email and internal systems might also have been compromised.

The possibility that customers' personally identifiable information was also exposed was quickly discounted. Following a review, creditsafe concluded that its internal systems were also safe.

In a statement on its site, Creditsafe said it planned to restore its website to normal as soon as possible. A representative of the firm told El Reg that it hoped to restore the site either later on Wednesday afternoon or on Thursday. The initial attack itself remains under investigation, and it's not clear what kind of malware was been punted via the assault.

Creditsafe promises to update the status of its site via its Twitter feed.

Although Creditsafe's action disrupted its business it was wise to take its website offline while it established the scope of the breach against its systems. Consumers, in general, are more sensitive to the leak of personal information following high-profile breaches involving Sony, marketing outfit Epsilon and others over recent weeks.

Oddly these incidents seem to have more of an effect than hacks that exposed credit card details and resulted in fraud to customers of TJX and Heartland in previous years.

Firms in the financial service sector, in particular, need to be especially risk-averse, assuming the worst for the sake of their customers - as well as their own longer-term reputations.

1 Creditsafe Limited should not be confused with Creditsafe Business Solutions Limited, a separate firm unaffected by the security flap affecting its near-namesake.

Choosing a cloud hosting partner with confidence

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.