{"id":35921,"date":"2020-07-07T06:35:12","date_gmt":"2020-07-07T06:35:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/"},"modified":"2020-07-07T06:35:12","modified_gmt":"2020-07-07T06:35:12","slug":"hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/","title":{"rendered":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers"},"content":{"rendered":"<p>More than 240 website subdomains belonging to organizations large and small, including household names, were hijacked to redirect netizens to malware, X-rated material, online gambling, and other unexpected content.<\/p>\n<p>These big names are said to include Chevron, the Red Cross, UNESCO, 3M, Getty Images, Hawaiian Airlines, Arm, Warner Brothers, Honeywell, Autodesk, Toshiba, Xerox, the NHS, Siemens, Volvo, Clear Channel, Total, and more.<\/p>\n<p>And it&#8217;s all due to the way they were hosted in Microsoft&#8217;s Azure cloud.<\/p>\n<p>Take Xerox for example. One of its subdomains, <b>advanced.core.freeflow.xerox.com<\/b>, was commandeered to host pages linking to websites advertising escorts, kitchenware, oil paintings, and more, in the hope that the reputation of <b>xerox.com<\/b> would boost the linked-to sites in web search engine rankings.<\/p>\n<p>At one point <b>advanced.core.freeflow.xerox.com<\/b> was hosted in the Microsoft cloud on a server named something along the lines of <b>webserver9000.azurewebsites.net<\/b>, chosen by Xerox&#8217;s IT admins. When whatever was living at <b>advanced.core.freeflow.xerox.com<\/b> was no longer needed, Xerox would have spun down <b>webserver9000.azurewebsites.net<\/b>, releasing it for others to use. Crucially, <b>advanced.core.freeflow.xerox.com<\/b> still pointed to <b>webserver9000.azurewebsites.net<\/b>, so when someone else came along and spun up a virtual server using that hostname, they could control the content of <b>advanced.core.freeflow.xerox.com<\/b>.<\/p>\n<p>It&#8217;s not quite true to say these organizations have been hacked; it&#8217;s more like they rented a corner of the internet, stuck their logo and name on it, and then when they no longer needed that space, they emptied it out but left the door unlocked for others to sneak in and run a casino or a porno store at the same address under the same brand.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/03\/03\/shutterstock_microsoft_disguise.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Someone in a disguise next to Microsoft icons\"><\/p>\n<h2 title=\"Lax DNS leaves door wide open for miscreants to impersonate Windows giant on its own websites\">Download this update from mybrowser. microsoft.com. Oh, sorry, that was malware on a hijacked sub-domain. Oops<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/03\/04\/microsoft_subdomain_takeover\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>It&#8217;s an oversight that has plagued Azure-hosted sites for as long as we can remember, and we&#8217;ve written about it <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/01\/23\/office_365_network_hole\/\" rel=\"noopener noreferrer\">previously<\/a>. Even Microsoft <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/03\/04\/microsoft_subdomain_takeover\/\" rel=\"noopener noreferrer\">accidentally<\/a> allowed some of its own long-forgotten subdomains to slip into the hands of spammers. This latest subdomain joyride spree is doubly embarrassing for Xerox, we note, because the Maze ransomware crew <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/mazenews.top\/xerox-corporation-ywlft\">also claims<\/a> to have infiltrated the tech giant&#8217;s network and exfiltrated gigabytes of internal data, which, we&#8217;re told, will be leaked unless the extortionists are paid off.<\/p>\n<h3 class=\"crosshead\"> <span>What&#8217;s new?<\/span><br \/>\n<\/h3>\n<p>The latest list of hijacked subdomains was drawn up by Zach Edwards, who reported the URLs at the end of June to Microsoft as well as the affected organizations, and shared a copy with <i>The Register<\/i> to verify. He said he earlier reported two to three dozen commandeered government and university subdomains as a priority. In May, Edwards, who cofounded analytics biz Victory Medium, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/05\/20\/houseparty_subdomain_hijack\/\" rel=\"noopener noreferrer\">also spotted<\/a> malware being served from forgotten Epic Games subdomains.<\/p>\n<p>Edwards told us last night a large chunk of these latest subdomains appear to have been taken over by a single group that has been active for years. &#8220;They are used by an international criminal group who does lots of things with them,&#8221; he explained. &#8220;Some pages redirect to malware, some redirect to porn or casinos or other potential clients that pay them for inbound links, some direct to malicious chrome extensions, or cracked software.<\/p>\n<p>&#8220;It&#8217;s clearly automated: they have hit tons of organizations, and uploaded tons of malware. I&#8217;ve warned a bunch of organizations that their biggest fear should be this legacy group partnering with some other group that is more destructive. Hopefully that isn&#8217;t happening at scale, but I fear the worst, and I believe this group is far more sophisticated than they are given credit for.&#8221;<\/p>\n<p>In many cases, Edwards said, the crooks try to hide their presence once they&#8217;ve hijacked a subdomain, making the root URL show a 404 or &#8220;coming soon&#8221; message. Further down the directory tree, however, are potentially thousands of files containing everything from malicious redirects through affiliate links to pages designed to trick people into installing malware to links to blogs and seedy sites to boost their rankings.<\/p>\n<h3 class=\"crosshead\"> <span>20 freaking per cent?<\/span><br \/>\n<\/h3>\n<p>Edwards told us roughly 20 per cent of the subdomains he reported have been shut down. <i>The Register<\/i> is in the process of contacting the organizations that have had their subdomains hijacked for comment. &#8220;We were made aware of the situation on June 30th and it has been resolved,&#8221; Autodesk told us last night.<\/p>\n<p>At the end of last month, Microsoft published a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/subdomain-takeover\">support article<\/a> explaining to customers how to avoid losing control of their subdomain content to miscreants. The Windows titan would not confirm or deny the dangling DNS advisory was issued after learning so many of its cloud clients had been caught out by spammers. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/07\/07\/microsoft_azure_takeovers\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS entries left pointing to Azure-hosted server names snatched by miscreants for mischief More than 240 website subdomains belonging to organizations large and small, including household names, were hijacked to redirect netizens to malware, X-rated material, online gambling, and other unexpected content.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35922,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-35921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-07T06:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers\",\"datePublished\":\"2020-07-07T06:35:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/\",\"name\":\"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg\",\"datePublished\":\"2020-07-07T06:35:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/","og_locale":"en_US","og_type":"article","og_title":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-07T06:35:12+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers","datePublished":"2020-07-07T06:35:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/"},"wordCount":810,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/","url":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/","name":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg","datePublished":"2020-07-07T06:35:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hundreds-of-forgotten-corners-of-mega-corp-websites-fall-into-the-hands-of-spammers-and-malware-slingers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hundreds of forgotten corners of mega-corp websites fall into the hands of spammers and malware slingers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35921"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35921\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35922"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}