Hackers Exploit Legacy Software to Spread Malicious Sites