Details Tied to Safari Browser-based 'ScamClub' Campaign Rev

Details Tied to Safari Browser-based 'ScamClub' Campaign Revealed


minute read
Share this article:
Public disclosure of a privilege escalation attack details how a cybergang bypassed browser iframe sandboxing with malicious PostMessage popups.
Details of a flaw in Apple’s Safari browser, publicly disclosed Tuesday, outline how the cybergang known as ScamClub reached 50 million users with a three-month-long malicious ad campaign pushing malware to mobile iOS Chrome and macOS desktop browsers.
The Safari bug, patched on Dec. 2 by Apple, was exploited by a malvertising campaign that redirected traffic to scam sites that flogged gift cards, prizes and malware to victims. Impacted was Apple’s Safari browser running on macOS Big Sur 11.0.1 and Google’s iOS-based Chrome browser. The common thread is Apple’s WebKit browser engine framework.

Related Keywords

Eliya Stein , Saryu Nayyar , Google , Walmart , Confiant Security , Scamclub Details , Content Delivery Network Hosted , Apple Safari Webkit , Hacks , Malware , Vulnerabilities , Web Security , Mobile Security , Privacy , சரியு நய்யார் , கூகிள் , வால்மார்ட் , உள்ளடக்கம் டெலிவரி வலைப்பின்னல் ஹோஸ்ட் செய்யப்பட்டது , ஹேக்ஸ் , தீம்பொருள் , வலை பாதுகாப்பு , கைபேசி பாதுகாப்பு , ப்ரைவஸீ ,

© 2025 Vimarsana