You won’t need an incredibly good memory to recall that Jamie’s Oliver was found to have been spreading malware recently.
In fact, it’s less than a month since I wrote about how the naked chef’s website had been serving up an exploit kit since early December of last year, and infecting visiting computers with malware.
Well, Jamie Oliver’s website is in a right pickle yet again.
Does Jamie’s IT team not give a fig about computer security? He should be going bananas that his website has once again being compromised, and for at least the last eight days been redirecting to an exploit kit serving up malware.
I’d be pretty cheesed off if I was him - the site’s administrators clearly failed to properly find what the security issue was with the site last time, and appears to have been compromised so easily again.
Fox-IT researcher Maarten van Dantzig tells me that sites used in this particular campaign include oscar-tube.com, jalocamex.pw, kasperloker.pw, glokasyv.pw, and lasokebun.pw.
Jamie, I know you have a lot on your plate, but this is no small potatoes. Secure your website, or find someone worth their salt who can.