In fact, it’s less than a month since I wrote about how the naked chef’s website had been serving up an exploit kit since early December of last year, and infecting visiting computers with malware.
Well, Jamie Oliver’s website is in a right pickle yet again.
Does Jamie’s IT team not give a fig about computer security? He should be going bananas that his website has once again being compromised, and for at least the last eight days been redirecting to an exploit kit serving up malware.
I’d be pretty cheesed off if I was him – the site’s administrators clearly failed to properly find what the security issue was with the site last time, and appears to have been compromised so easily again.
Fox-IT researcher Maarten van Dantzig tells me that sites used in this particular campaign include oscar-tube.com, jalocamex.pw, kasperloker.pw, glokasyv.pw, and lasokebun.pw.
Jamie, I know you have a lot on your plate, but this is no small potatoes. Secure your website, or find someone worth their salt who can.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.