By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    CosmicStrand: a UEFI rootkit
    8 months ago
    Cloak and Dagger: A hole in Android
    7 months ago
    Mobile malware masked as porn apps
    8 months ago
    Latest News
    Safeguards against firmware signed with stolen MSI keys
    17 hours ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    17 hours ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
    6 days ago
    Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
    7 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Surface Pro 4 teardown: Get a closer look at the components
    8 months ago
    How to reset Windows Update components on Windows 10
    8 months ago
    Windows 11 build 22610 with new changes in Dev and Beta Channels
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    3 months ago
    Now you can speed up any video in your browser
    3 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    4 months ago
  • How To
    How ToShow More
    What is two-factor authentication | Kaspersky official blog
    2 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    4 days ago
    NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
    4 days ago
    How Oxy uses hooks for maximum extensibility
    How Oxy uses hooks for maximum extensibility
    5 days ago
    The personal threat landscape: securing yourself smartly
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How do you know if your accounts have been hacked?
    7 months ago
    How to protect yourself from piercing by IP address?
    7 months ago
    How to find out the IP address of your enemy in a couple of clicks
    7 months ago
    Latest News
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    2 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    2 days ago
    How to check USB4 devices specs from Settings on Windows 11
    2 days ago
    How to enable new header UI for File Explorer on Windows 11
    7 days ago
  • Glossary
  • My Bookmarks
Reading: Linux malware attacks WordPress sites
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Linux malware attacks WordPress sites

Tom Grant
Last updated: 9 February
Tom Grant 4 months ago
Share
5 Min Read

Doctor Web specialists discovered malware for Linux that hacks websites running WordPress by exploiting 30 vulnerabilities in a number of plugins and themes for this CMS. Malicious JavaScript scripts are injected into vulnerable sites, due to which, when clicking anywhere on a compromised page, visitors are redirected to other resources.

The researchers write that this malware may be the malicious tool with which the attackers have been using for more than three years to carry out attacks and earn money by reselling traffic – arbitrage.

The malware received an identifier Linux.BackDoor.WordPressExploit.1 and is designed to work on devices running 32-bit OS of the Linux family, however, it can also function in 64-bit systems. Malware is a backdoor that attackers control remotely. At their command, he is able to perform the following actions:

  • attack a given web page (site);
  • switch to standby mode;
  • to finish work;
  • stop logging of completed actions.

The main function of this Trojan is to hack sites based on the WordPress CMS and inject a malicious script into their pages. To do this, he uses known vulnerabilities in WordPress plugins, as well as in website themes. Before the Trojan contacts the control server and receives from it the address of the resource that needs to be hacked. It then attempts to exploit vulnerabilities in outdated versions of the following plugins and themes that may be installed on the site:

  • WP Live Chat Support Plugin;
  • WordPress – Yuzo Related Posts;
  • Yellow Pencil Visual Theme Customizer Plugin;
  • Easysmtp;
  • WP GDPR Compliance Plugin;
  • Newspaper Theme on WordPress Access Control (Vulnerability CVE-2016-10972);
  • Thim Core;
  • Google Code Inserter
  • Total Donations Plugin;
  • Post Custom Templates Lite;
  • WP Quick Booking Manager
  • Faceboor Live Chat by Zotabox;
  • Blog Designer WordPress Plugin;
  • WordPress Ultimate FAQ (vulnerabilities CVE-2019-17232, CVE-2019-17233);
  • WP-Matomo Integration (WP-Piwik);
  • WordPress ND Shortcodes For Visual Composer;
  • WP Live Chat;
  • Coming Soon Page and Maintenance Mode;
  •  

If one or more vulnerabilities are successfully exploited, malicious JavaScript downloaded from a remote server is injected into the landing page. In this case, the injection occurs in such a way that when the infected page is loaded, this JavaScript will be initiated the very first (regardless of what content was on the page earlier). In the future, when clicking anywhere on the page, users will be redirected to the site the attackers need. An example of such an injection can be seen below.

It is noted that the Trojan program maintains statistics of its work: it tracks the total number of attacked sites, all cases of successful use of exploits, and additionally, the number of successful exploits of vulnerabilities in the WordPress Ultimate FAQ plugin and Facebook messenger* from Zotabox. In addition, the malware informs the remote server about all detected unpatched vulnerabilities.

Along with the current modification of the malware, experts also identified its updated version – Linux.BackDoor.WordPressExploit.2. It differs from the original one by the address of the command and control server, the address of the domain from which the malicious script is loaded, as well as an extended list of exploitable vulnerabilities for the following plugins:

  • Brizy WordPress Plugin
  • FV Flowplayer Video Player;
  • WooCommerce;
  • WordPress Coming Soon Page;
  • WordPress theme OneTone;
  • Simple Fields WordPress Plugin
  • WordPress Delucks SEO plugin
  • Poll, Survey, Form & Quiz Maker by OpinionStage;
  • Social Metrics Tracker;
  • WPeMatico RSS Feed Fetcher;
  • Rich Review plugin.

At the same time, in both versions of the malware, unimplemented functionality for hacking the accounts of administrators of attacked sites using brute force was revealed. It is assumed that this feature was either present in earlier modifications, or, conversely, is planned by attackers for future versions of the malware. If such an opportunity appears in other versions of the backdoor, cybercriminals will be able to successfully attack even some of those sites that use current versions of plug-ins with closed vulnerabilities.

* Banned in Russia. Owned by Meta Platforms, which is recognized as an extremist organization and its activities are banned in Russia


Source: xaker.ru

Translate this article

TAGGED: Linux, Malware, PoC, Vulnerabilities, WordPress, WordPress plugins
Tom Grant February 9, 2023 February 9, 2023
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Safeguards against firmware signed with stolen MSI keys
Threats 20 hours ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats 20 hours ago
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
News 2 days ago
How to enable Taskbar End Task option to close apps on Windows 11
News 2 days ago
How to check USB4 devices specs from Settings on Windows 11
News 2 days ago

Recent Posts

  • Safeguards against firmware signed with stolen MSI keys
  • WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
  • How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
  • How to enable Taskbar End Task option to close apps on Windows 11
  • How to check USB4 devices specs from Settings on Windows 11

You Might Also Like

Threats

Safeguards against firmware signed with stolen MSI keys

20 hours ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats

WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin

20 hours ago
How To

What is two-factor authentication | Kaspersky official blog

2 days ago
How To

The personal threat landscape: securing yourself smartly

5 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

What is two-factor authentication | Kaspersky official blog
Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
How Oxy uses hooks for maximum extensibility
The personal threat landscape: securing yourself smartly
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
Previous Next
Hot News
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?