Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WebKit Exploit Forces iOS Safari Users onto Scam Pages

WebKit Exploit Forces iOS Safari Users onto Scam Pages

Posted on March 3, 2026 By CWS

A cybercriminal group known as D-Shortiez has been executing a persistent malvertising campaign by exploiting a WebKit browser behavior to trap iOS Safari users on fraudulent pages. This method leaves users with minimal options to exit these scam sites.

The Evolution of Forced Redirect Attacks

While forced redirect attacks have been part of online ad fraud for years, D-Shortiez’s approach distinguishes itself through a technical twist: a back-button hijack. This method strips users of their ability to return to previous pages after landing on malicious sites.

Historically, forced redirect campaigns have become less common as ad platforms and browser developers enhance their security measures. However, malvertisers continue to exploit minor technical loopholes to extend the lifespan and reach of their operations.

D-Shortiez’s Campaign Tactics

Analysts at Confiant have identified D-Shortiez as a group actively engaging in these forced redirect operations, which lead victims to familiar online scams. The campaign begins with routine fingerprinting and tracking processes, which do not initially raise alarms.

What caught researchers’ attention was the redirect mechanism, specifically a nested try/catch block in the script that manages forced redirection by triggering multiple redirect attempts at once. This tactic exploits differences in how browsers handle redirects to increase the chances of success.

Impact and Exploitation of the WebKit Popstate Event

Over the past six months, D-Shortiez has distributed over 300 million malicious ad impressions, primarily targeting audiences in the United States, with some reach into Canada and Europe. The campaign’s rhythm has been characterized by bursts of high-volume activity followed by short pauses, suggesting strategic management of their operations.

The most notable technical aspect is how D-Shortiez manipulates the browser’s popstate event to trap Safari users. By inserting a fake entry into the session history stack using window.top.history.pushState(), and catching back-button presses with an onpopstate event handler, the group effectively locks users into scam pages.

Security Measures and Recommendations

The vulnerability was reported to Apple on September 29, and a patch was released on January 23, identified as HT213600. Users who have not yet updated their Safari browsers remain vulnerable to this exploit.

iOS and Safari users are strongly advised to install the security update HT213600 immediately to protect against this back-button hijack. Additionally, security teams should audit and secure their ad supply chains and block known D-Shortiez domains at the DNS and network levels.

Stay informed by following us on Google News, LinkedIn, and X for the latest updates, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:Apple update, back-button hijack, browser security, Cybersecurity, D-Shortiez, iOS Safari, Malvertising, online scams, redirect attack, WebKit

Post navigation

Previous Post: Hacktivist Surge Amid US-Israel Strikes on Iran
Next Post: Iranian Drone Attacks Expose Data Center Vulnerabilities

Related Posts

Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks Cyber Security News
New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key Cyber Security News
New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware Cyber Security News
Critical Honeywell CCTV Flaw Exposes User Accounts Critical Honeywell CCTV Flaw Exposes User Accounts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News