Paul McCartney's official website was compromised following his reunion with Beatles drummer Ringo Starr.


ScanSafe reported that the website was attacked by the LuckySploit toolkit that was recently updated to include a set of HTML files that contain obfuscated and malicious JavaScript code. The company first detected and began blocking the attack on Saturday 5th April at 12:36pm GMT.


It claimed that LuckySploit was hidden behind an invisible iframe on the website which hid heavily disguised JavaScript code in the web page using key encryption and other obfuscation techniques. The code then launched exploits which download executable programs such as a rootkit onto the victims PC.


Spencer Parker, director of product management at ScanSafe, said: “Once your computer is infected with a rootkit, none of your personal information is safe. This site will have been an extremely attractive target for cybercriminals given the level of attention it will be receiving at the moment.


“Users should be aware that the majority of malware distribution is now occurring through mass compromise of legitimate and reputable websites.”