Hijacked Cookie Consent plugin detected.
When the Cookie Consent plugin by Silktide stopped using Amazon CDN, someone hijacked their Amazon storage and began serving malicious scripts so that sites that still use old version of this plugin serve aunwanted ads and redirect mobile visitors instead of notifying new users about cookie use policy.
The hxxps://s3-eu-west-1.amazonaws[.]com/assets.cookieconsent.silktide.com/current/plugin.min.js script loads ads from s3-cdn[.]com/js2/get-js.js and redirect mobile visitors to hxxp://get.imobilecontent[.]tk/?utm_medium=6a9d4be48f9dd74ece2547f9a7d3ed068107809c&utm_campaign=aws_bb_2&1=
Affecting: Sites (mostly WordPress) with old versions of the Silktide Cookie Concent plugin
Cleanup: Remove the Cookie Consent plugin or update it to the latest version.