Read Time:33 Second
This website, which uses the WordPress content management system, may inadvertently allow hackers / attackers to use its credentials and URL for purposes such as phishing or ….
At the following address, there is a parameter in the URL that can lead the visitor to the attacker site due to not paying attention to security points:
http://old.kut.ac.ir/?wptouch_switch=desktop&redirect= {Hacker Refer Website}
The visitor, who usually pays attention to the beginning of the address, thinks that he will enter the university website, which will be redirected to the hacker’s desired website.
This website was registered by a hacker named h4shur Defis a few hours ago.

About Post Author
Treadstone 71
@Treadstone71LLC
Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence