Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors

Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors

A Large number of WordPress websites were compromised in last two weeks with a new malware campaign spotted in the wild.

WordPress, a Free and Open source content management system (CMS) and blogging tool, has been once again targeted by hackers at large scale.

Researchers at Sucuri Labs have detected a “Malware Campaign” with an aim of getting access to as many devices they can by making innumerable WordPress websites as its prey.

The Malware campaign was operational for more than 14 days ago, but it has experienced a massive increase in the spread of infection in last two days, resulted in affecting more than 5000 Wordpress websites.

The Security researchers call this malware attack as “VisitorTracker”, as there exists a javascript function named visitorTracker_isMob() in the malicious code designed by cyber criminals.

This new campaign seems to be utilizing the Nuclear Exploit Kit and uses a combination of hacked WordPress sites, hidden iframes and number of known and unknown Browser exploits.

Though if we go by the name, it’s meaning can be extracted as tracking every visitor who accesses the victimized WordPress sites and further redirects them to the specially crafted page where the Nuclear Exploit Kit is planted.
So, Plan of Action is:

Insert a malware code to all the JavaScript files on the compromised WordPress website.
On sensing a Visitor, Taking him to the exploit landing page via an iFrame.

The landing page pushes browser based Exploits on the victim’s system to gain access.
If Introspect, we'll notice that the exploit kit being used here can deploy attacks through vulnerabilities in plugins with an aim of data exfiltration.

The Sucuri researchers team as a solution suggest, “The infection is very buggy and often removed single-quotes from legitimate files that corrupt the site completely. Affects plugins, themes and even core files of WordPress and Joomla. The solution is to restore files from a clean backup.”

Moreover, to check if you are affected by the attack follow the below-mentioned command: (user with Admin rights can access)

grep -r “visitorTracker_isMob” /var/www/

Additionally, as a prevention:

Keep your plugins up-to-date, with latest security patches implemented.

Always maintain a backup of your sensitive data.

Wayne Miller

Director SEO, Project Management, Product Developer

9y

It would be great if wordpress could have a version where each install creates a random file tree structure - also needs a new database framework.

Like
Reply

To view or add a comment, sign in

More articles by Avadhesh Yadav

  • My WordPress Website hacked, what do I do?

    Do you think that your WordPress website has been hacked? Symptoms of a hacked website are the site being down, text…

    3 Comments
  • How to Fix WordPress Menu Item Limit

    Recently FreshFACE TEAM Launch Plugin WordPress Menu Item Limit is a common and well known issue. If you add too much…

  • GEO MARKETING WHY ITS IMPORTANT NOW THESE DAYS

    “Geo Marketing Why Its Important Now These Days ” It’s perhaps one of the most commonly recited marketing tenets…

    4 Comments
  • Six SEO Strategies for WordPress Users

    SEO starts with a good website. You might think the search engines only exist to help people find your website, but of…

    1 Comment

Insights from the community

Others also viewed

Explore topics