University Websites Hijacked by Scammers to Serve Porn Content
Scammers have hijacked hundreds of subdomains from dozens of major universities to serve pornographic content. The attacks exploit poor website maintenance practices by university IT departments.

Cybercriminals have taken control of hundreds of university website subdomains to redirect visitors to pornographic and scam content. The attacks target subdomains - web addresses that branch off from main university sites.
The problem stems from universities failing to properly maintain their web infrastructure. Many schools create subdomains for professors, departments, and projects but don't monitor them closely. When these subdomains are abandoned or forgotten, scammers can take them over.
Students at UC Davis recently discovered pornographic content appearing on what looked like official university web addresses. Similar incidents have been reported at other major universities across the country.
The hijacked sites pose multiple risks. They can trick people into thinking explicit content comes from trusted educational institutions. They also help scammers bypass school internet filters designed to protect students from inappropriate material.
Security experts say universities need better "digital housekeeping" - regularly checking and securing all their web properties, even forgotten ones.
Students and parents searching for official university information could accidentally encounter inappropriate content. These hijacked sites can also bypass school internet filters, exposing minors to explicit material.
Universities will need to audit their subdomains and implement stronger security protocols to prevent future hijackings.
Was this article helpful?
0 people found this helpful