News and Information Sites

N

News and Information sites are digital platforms dedicated to disseminating current events, aggregating content, and facilitating knowledge sharing (e.g., Q&A and academic research). In a cybersecurity context, these sites pose a significant risk because their high authority and traffic make them ideal vehicles for disinformation, malvertising, targeted social engineering, and the distribution of malicious links that bypass security filters. They are trusted conduits that attackers seek to exploit.

News/Aggregators

These platforms gather, curate, and distribute content across various topics, acting as a primary source of online media consumption.

  • Cybersecurity Context:

    • Malvertising and Drive-by Attacks: High-traffic news and entertainment sites (CNET, BuzzFeed, TheVerge, gamesradar.com) are prime targets for malvertising. Threat actors inject malicious ads that redirect users to exploit kits or sites that initiate drive-by downloads of malware (ransomware, banking Trojans) without user interaction.

    • Disinformation and Brand Attack: Sites like DailyKos and Americanthinker (political commentary), or aggregators like Slashdot and N4g, are used for influence operations. Attackers create fake articles or comments to spread targeted disinformation, damaging a competitor's reputation or manipulating public opinion and stock prices.

    • Phishing and Link Camouflage: The high authority of domains like Tom's Guide or PC Gamer means their links are often trusted. Attackers may compromise comment sections or post a story containing a link to a credential harvesting site, leveraging the site's authority to evade spam filters.

    • Examples: A user visiting Thechive is redirected by a malicious advertisement to a fake login page for their email service. An attacker compromises the comment section on techspot.com and posts a link to a supposed software patch that instead installs a keylogger.

Knowledge/Q&A Sites

These sites focus on user-contributed expertise, academic publishing, and collaborative knowledge building.

  • Cybersecurity Context:

    • Data Leakage via Q&A: Users on Q&A and research sites like Quora, YandexZnatoki, Academia.edu, and ResearchGate frequently post technical questions or share papers that inadvertently contain sensitive data about their organization's technology stack, network configuration, or proprietary research, which threat actors then scrape.

    • Malicious Code and Files: Sites that allow file sharing or code snippets (Instructables, SoftwareInformer) can be used to distribute malicious content disguised as helpful tutorials, academic datasets, or legitimate software utilities.

    • Targeted Social Engineering: Attackers profile security researchers or academics by analyzing their activity on ResearchGate and Bibsonomy to craft hyper-specific spear-phishing emails targeting their professional work.

    • Examples: A developer posts a question on Quora asking for help with a specific, proprietary API they are building, accidentally revealing the API's endpoint and parameter structure. An attacker downloads a utility from SoftwareInformer that promises to enhance productivity but contains adware or a backdoor.

ThreatNG is crucial for mitigating the risks posed by News and Information sites, as their high trust and traffic make them ideal platforms for attack campaigns. ThreatNG provides continuous, external monitoring to detect when these sites are abused for brand attacks, data leaks, or the distribution of malware targeting an organization or its employees.

External Discovery and Continuous Monitoring

ThreatNG’s External Discovery process automatically maps an organization's exposure across authoritative news, entertainment, and knowledge-sharing platforms. Continuous Monitoring ensures threats are caught the moment they are posted or archived.

  • Archived Web Pages: ThreatNG continuously scrapes archived content for mentions of organizations and sensitive data. This is critical for Knowledge/Q&A sites. Suppose an employee posts a technical question on Quora or YandexZnatoki asking for help with a proprietary server issue and accidentally includes API keys, usernames, or configuration details. In that case, ThreatNG’s archived page indexing can still discover the deleted content and flag the exposure of API keys, TXT files, or usernames.

  • Sentiment and Financials: This component addresses the risk of disinformation and financial manipulation originating from news sites. ThreatNG tracks Organizational Related Lawsuits and Layoff Chatter across the public web, including news aggregators. A surge in negative or false discussion on a major aggregator like TheVerge or a technical site like Tom's Guide can signal an imminent brand attack or financial espionage, alerting security teams to a potential crisis.

  • Dark Web Presence: ThreatNG continuously monitors the Dark Web and high-risk forums for mentions of the organization and Compromised Credentials. A breach of a large news site like CNET or an academic site like Academia.edu that contains corporate emails will be immediately detected.

External Assessment for News and Information Risks

ThreatNG's External Assessment quantifies the severity of risks from these platforms, focusing on the high potential for phishing and malware delivery.

  • BEC & Phishing Susceptibility: This score measures vulnerability to attacks using the credibility of these sites.

    • Example 1 (Malicious Links): ThreatNG's assessment actively scans user-generated content and comments on sites like Slashdot, iFunny.co, and PCGamer for links to Malicious Content or newly registered, fraudulent domains. The discovery of a link on a respected site like TheVerge that redirects to a credential-harvesting page is flagged as a high-risk phishing vector, thereby increasing the organization's BEC susceptibility score.

    • Example 2 (Impersonation): The assessment detects the creation of fake "news" accounts or malicious subreddits that impersonate the organization on large aggregators. These profiles are used to push malicious links or disinformation. ThreatNG flags this Brand Impersonation, ensuring rapid remediation.

  • Data Leak Susceptibility: This score is highly impacted by PII exposure on knowledge sites. The discovery of Associated Compromised Credentials from breaches of Quora or ResearchGate that match employee corporate email addresses immediately elevates this score, given the high probability of password reuse.

Investigation Modules and Username Exposure

The Investigation Modules are vital for linking pseudonymous activity on Q&A sites back to specific internal risks.

Social Media Investigation Module - Username Exposure

This module is essential for combating social engineering and identity theft that originates from both news commentary and knowledge sharing.

  • Passive Reconnaissance: The module performs broad checks for usernames and handles of key personnel across thousands of forums and sites, including Knowledge/Q&A and News/Aggregators. It checks explicitly for usernames on Quora, Instructables, TomsHardware, and Reddit threads.

  • Example: ThreatNG discovers that a high-value engineer's technical username is active on Instructables and YandexZnatoki, asking detailed questions about a specific, proprietary internal technology. Furthermore, the same username was exposed in a credential dump from a site like Cracked. The Username Exposure module correlates this credential re-use and high-risk technical disclosure, alerting the security team to enforce a password change and MFA for the employee, preventing an attacker from gaining valuable system insight and internal access.

Intelligence Repositories and Reporting

ThreatNG's Intelligence Repositories provide the decisive context to prioritize the high volume of threats originating from these public sites.

  • DarCache Vulnerability (KEV, EPSS, PoC Exploit): This tracks threats embedded in these platforms. Suppose a new exploit is actively used in malvertising on high-traffic sites like CNET or AnimeNewsNetwork. In that case, ThreatNG flags it as a Known Exploited Vulnerability (KEV), allowing the organization to patch the vulnerable software targeted by the malvertisement.

  • DarCache Dark Web and DarCache Rupture (Compromised Credentials): This tracks data dumps. Suppose a threat actor posts a database of user credentials from SoftwareInformer or Anime-planet on the Dark Web. In that case, DarCache Rupture filters the data to flag all employee corporate email addresses found, classifying them as Associated Compromised Credentials.

Reporting compiles all these findings—from an exposed document on Academia.edu to a malvertising campaign on BuzzFeed—into Prioritized reports, enhanced with MITRE ATT&CK Mapping, correlating observations (e.g., posting a malicious link) to adversary tactics such as "Initial Access" and "Defense Evasion."

ThreatNG with Complementary Solutions

ThreatNG's external threat data from News and Information sites can be seamlessly integrated into complementary security solutions.

  • Integration with a Security Information and Event Management (SIEM) Complementary Solution: ThreatNG's Archived Web Pages module identifies that an internal security policy document was accidentally posted to a public Q&A platform, such as ResearchGate. ThreatNG extracts the unique document signature and shares it with a SIEM-complementary solution (such as Splunk). The SIEM can then immediately perform a historical log search across all internal file-sharing activity to identify who accessed and uploaded the document, turning the external leak into an internal forensics investigation.

  • Integration with an Email Security Gateway (ESG) Complementary Solution: ThreatNG's BEC & Phishing Susceptibility module detects a widespread malvertising campaign that is actively leveraging a high-authority news site's domain (CNET or TheVerge) to send phishing emails. ThreatNG pushes the domain's reputation score and the specific malicious ad network information to an ESG complementary solution. The ESG solution can then preemptively block any email containing links from that compromised ad network, regardless of the sender, neutralizing a sophisticated malvertising threat.

Previous
Previous

Shopping and E-Commerce Sites

Next
Next

Gaming and Entertainment Sites