The Pakistani programmer who d믭 himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it. The Pakistani programmer who dubbed himself “the guy who liveblogged the Osama raid without knowing about it” is also the guy who got his website hacked without knowing about it.Sohaib Athar was in the international spotlight Monday morning after he inadvertently tweeted about the early morning raid that killed Osama bin Laden and several of his associates. His on-the-ground tweets provided early details on what could turn out to be the biggest news story of the year — even though he didn’t know what was happening at the time — and by Monday afternoon he had more than 76,000 Twitter followers.But according to security firm Websense, curious Web surfers who visited Athar’s blog, Reallyvirtual.com, early on Monday may have had scareware software silently installed on their computers. Websense Security Research Manager Patrik Runald said Athar’s blog had been hacked, and that the site was attempting to install the malicious program until about 9 a.m. Pacific Time Monday. In an e-mail interview, Athar confirmed his site had been compromised but said it happened before he sent his tweets about bin Laden. “The site was hit with malware a few days ago,” he said. “Upgrading the server … has been on my list of things to do for the last few weeks, just never got around to doing it.” “The bad guys just got lucky,” Runald said. Criminals are constantly scouring the Web looking for websites running out-of-date software that can be hacked. And sites running the Word Press software, which Athar was using, are always popular targets.Runald found the malware on the site at 8:10 a.m. Pacific Time on Monday. By 9:25 a.m. it had been cleaned up, he said. Although it’s hard to say for certain how the site was hacked, Runald said Athar was using an older version of the WordPress blogging software that may have allowed criminals to break into his site.The attack code on Athar’s blog targeted an array of known flaws affecting Windows software. It installed a fake system scanner, called Windows Recovery, on computers running unpatched versions of many programs including the Windows operating system, Java and Adobe Reader.Windows Recovery hides system folders on the PC and then tries to scare the victim into paying for bogus software that it claims will fix the issue.Athar started posting Twitter messages at about 1 a.m. local time about the raid on bin Laden’s compound in Abbottabad. “Helicopter hovering above Abbottabad at 1AM (is a rare event),” he wrote. “Go away helicopter – before I take out my giant swatter.”He continued to update his Twitter feed, adding details from local friends, and then commenting on the breaking international news story. On his blog, he called himself, “the guy who liveblogged the Osama raid without knowing about it.”It’s not clear how many people visited Athar’s blog while it was infected. Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert’s e-mail address is robert_mcmillan@idg.com Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe