Cisco said the attack compromises legitimate websites to redirect visitors to malicious ones Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.All the affected servers were running the 2.6 version, first released in December 2003, of the Linux kernel, which is the core of the operating system. Most were running a 2.6 Linux kernel version released in 2007 or earlier, wrote Martin Lee, technical lead of Threat Intelligence for Cisco.“Systems that are unmaintained or unsupported are no longer patched with security updates,” Lee wrote. “When attackers discover a vulnerability in the system, they can exploit it at their whim without fear of it being remedied.”After the Web server has been compromised, the attackers slip in a line of JavaScript to other JavaScript files within the website. That code bounces the website’s visitors to a second compromised host, which runs another JavaScript file. “The two-stage process allows attackers to serve up a variety of malicious content to the visitor,” Lee wrote.The visitor is then served pay-per-view fraud pages, which load up advertisements. Other clues indicate some visitors may be served malicious software, he wrote. One in 15 of Cisco’s clients using its Cloud Web Security product had one of their users attempt to request one of the malicious URLs, Lee wrote. The company saw 400 distinct hosts, with a high number in the U.S. and Germany, affected on March 17 and 18, showing “the spread of this attack has been dramatic,” he wrote.About 2,700 URLs have been affected. Because the attack centers on compromising legitimate websites, “security awareness campaigns that train users to be wary of unknown websites may not be effective against trusted websites that become compromised to serve malware,” Lee wrote.The campaign highlights the need for system administrators to continually update their systems.“Large numbers of vulnerable unpatched systems on the Internet are tempting targets for attackers,” Lee wrote. “Such systems can be used as disposable one-shot platforms for launching attacks.”Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe