Fake WordPress Functions Conceal assert() Backdoor

A few weeks ago, I was manually inspecting some files on a compromised website. While checking on a specific WooCommerce file, I noticed something interesting.
Among 246 other lines, this very specific part stood out to me:
$config = wp_dbase_config_i… Continue reading Fake WordPress Functions Conceal assert() Backdoor

Why is Your Website a Target? The SEO Value of a Website

Website security is what we eat, sleep, and breathe. It’s what we do best because we deal with hacked websites every single day, thousands of them. Among the various types and evolution in attack scenarios, one has remained the same for all thes… Continue reading Why is Your Website a Target? The SEO Value of a Website

A Puzzling Backdoor Upload

After a successful compromise, backdoors are frequently left behind and function as a point of re-entry into the website environment. These malicious pieces of code are a valuable tool for attackers and allow them to bypass any existing access control… Continue reading A Puzzling Backdoor Upload

Javascript Injection Creates Rogue WordPress Admin User

Earlier this year, we faced a growing volume of infections related to a vulnerability in outdated versions of the Newspaper and Newsmag themes. The infection type was always the same: malicious javascript designed to display unauthorized pop-ups or co… Continue reading Javascript Injection Creates Rogue WordPress Admin User

Spam via Expired Domains

During a recent cleanup investigation, we found an interesting case of spam images coming from a legacy theme. A theme or plugin becomes “legacy” when the developers no longer maintain, support and update the code. Eventually this investigation lead us to a whole network of expired domains being used by attackers to host spam images….

The post Spam via Expired Domains appeared first on Sucuri Blog.

Continue reading Spam via Expired Domains