When attackers shift up their campaigns, change their payload or exfiltration domains, and put some extra effort into hiding their malware it’s usually a telltale sign that they are making some money off of their exploits. One such campaign is the fake CloudFlare DDoS pages which we reported on last month.

The attack is simple: when browsing an infected website, the user receives a notification that insists they must download a file to continue to access the content.

Continue reading New Malware Variants Serve Bogus CloudFlare DDoS Captcha at Sucuri Blog.

Pin It on Pinterest