A couple of posts on Twitter brought to my attention earlier today that the Jerusalem Post is serving up malware to unsuspecting visitors. The attack tries to load an EXE (log.exe) detected as Mal/Behav-290. SophosLabs is adding detection for this SCRIPT injection and Mal/Badsrc-C has been added to the Sophos toolkit. In the current climate some will assume that the site has been hacked by a politically motivated hacker. However, in my experience the majority of hacks like this are done via a scattergun approach and it was just bad luck.”]
Source: https://nakedsecurity.sophos.com/2010/06/07/jerusalem-post-website-serving-malware/