Payment processor CheckFree says that hackers redirected customers from its Web site to a server that downloaded malware Online criminals took control of the Domain Name System (DNS) record for payment processor CheckFree and briefly redirected the site’s visitors to a their own server.The site was redirected at around 12:30 a.m. Eastern Time on Tuesday after someone logged into CheckFree’s Network Solutions account and changed the domain’s DNS settings, said Susan Wade, a Network Solutions spokeswoman. “Somebody got hold of the customer’s login information,” she said. “I don’t know how they got access.”By changing the domain’s DNS settings, the criminals were able to redirected Internet traffic to their own server.CheckFree regained control of the account around 5:00 a.m. and fixed the settings, Wade said. In a statement, CheckFree said that by 10:10 a.m. the rogue site’s Internet service provider had “isolated the non-CheckFree site so that no subscribers could connect to it.”While it was active, the site tried to install malicious software on victims’ computers, CheckFree said. “During the incident, users would have seen a blank page if they were redirected to the non-CheckFree site. Those with up-to-date security software would likely have received a message indicating a malware download attempt had occurred,” the company said. “If the user’s anti-virus software was out of date or they did not have anti-virus software installed, they may have been subject to a malware software download.”The attack targeted flaws in Adobe Acrobat and Adobe Reader, CheckFree said.CheckFree is advising its customers to download antivirus software and the latest updates to Adobe Reader, used to view pdf files.CheckFree has about 12,000 locations in the U.S. where customers can walk in and pay bills in person. It accepts payments for services such as utilities, credit cards and mobile phones. The company’s Web site can be used to pay bills too, however.This isn’t the first time Network Solutions’ account credentials have been used to seize control of a Web site. In May, hackers used a similar technique to knock Comcast.net off-line for several hours.News of the CheckFree hack was first reported in the Register after a reader noticed a problem with the Web site. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe