Magento Credit Card Stealer Reinfector

In the past few months, we have frequently seen how attackers are infecting Magento installations to scrape confidential information such as credit cards, logins, and PayPal credentials. That is why we have reported on a credit card stealer reinf… Continue reading Magento Credit Card Stealer Reinfector

Shell Logins as a Magento Reinfection Vector

Recently, we have come across a number of websites that were facing reinfection of a credit card information stealer malware within the following files:

app/Mage.php;
lib/Varien/Autoload.php;
index.php;
app/code/core/Mage/Core/functions.php;

These a… Continue reading Shell Logins as a Magento Reinfection Vector

Malicious Activities with Google Tag Manager

If I were to ask if you could trust a script from Google that is loading on your website, the majority of users would say “yes” or even “absolutely”. But when malicious behavior ensues, everything should be double-checked and s… Continue reading Malicious Activities with Google Tag Manager

Evolution of Conditional Spam Targeting Drupal Sites

Evolution of Conditional Spam Targeting Drupal Sites

Last year we took a look at how attackers  were infecting Drupal installations to spread their spam and keep their campaigns going by just including a malicious file in each visitor’s session.

It’s quite common for  attackers to evolve their techniques and add new variations of hidden backdoors to make it harder to get rid of the infection. These evasion and reinfection techniques can also make it difficult to modify the malicious code, which is what has exactly happened in this case, over a year later.

Continue reading Evolution of Conditional Spam Targeting Drupal Sites at Sucuri Blog.

Continue reading Evolution of Conditional Spam Targeting Drupal Sites

New Non-HTTPS Websites Blacklisted for Phishy Password Practices

New Non-HTTPS Websites Blacklisted for Phishy Password Practices

We submit hundreds of blacklist review requests every day after cleaning our clients’ websites. Google’s Deceptive Content warning applies when Google detects dangerous code that attempts to trick users into revealing sensitive information.

For the past couple of months we have noticed that the number of websites blacklisted with Deceptive Content warnings has increased for no apparent reason. The sites were clean, and there was no external resources loading on the website.

Continue reading New Non-HTTPS Websites Blacklisted for Phishy Password Practices at Sucuri Blog.

Continue reading New Non-HTTPS Websites Blacklisted for Phishy Password Practices

Fake WordPrssAPI Stealing Cookies and Hijacking Sessions

Fake WordPrssAPI Stealing Cookies and Hijacking Sessions

Cookies are stored in the user’s browser to track behavior on a specific website. They also keep a user logged in during the active browsing session. Without cookies a user would need to log in, in order to authenticate every action they take. Essentially, cookies keep a user logged in until they either log out or the cookie expires.

Cookie Stealing and Session Hijacking

If an attacker is able to steal active cookies, the attacker can pretend to be that user and perform any actions the user has permissions to perform.

Continue reading Fake WordPrssAPI Stealing Cookies and Hijacking Sessions at Sucuri Blog.

Continue reading Fake WordPrssAPI Stealing Cookies and Hijacking Sessions

Posted in SBN

vBulletin Malware – When Hackers Compete for Backdoor Control

vBulletin Malware – When Hackers Compete for Backdoor Control

A common pattern we see in compromised websites is the presence of backdoors and other malicious code.  During Q3 of 2016, we found that 72% of all compromises that we encountered had a PHP-based backdoor hidden within the site. Attackers experiment with various techniques and types of malware to abuse server resources and distribute spam while maintaining access to the site for as long as possible.

In the case of automated attacks, sometimes we’re lucky enough to see hackers access the same website and step on each other’s toes.

Continue reading vBulletin Malware – When Hackers Compete for Backdoor Control at Sucuri Blog.

Continue reading vBulletin Malware – When Hackers Compete for Backdoor Control

Posted in SBN