Fake Human Verification Spam

We recently released an update to our Labs Knowledgebase for new plugins that had been targeted during the month of July 2019.
One of these newly targeted plugins was Advanced Booking Calendar — and it didn’t take long before we were recei… Continue reading Fake Human Verification Spam

Misuse of WordPress update_option() function Leads to Website Infections

In the past four months, Sucuri has seen an increase in the number of plugins affected by the misuse of  WordPress’ update_option() function. This function is used to update a named option/value in the options database table. If developers … Continue reading Misuse of WordPress update_option() function Leads to Website Infections

Security Advisory: Targeting AD FS With External Brute-Force Attacks

On July 2019 Patch Tuesday, Microsoft released a patch for CVE-2019-1126, an important vulnerability discovered by Preempt Research Labs. The vulnerability discovered leads to security issues that create a wide scale denial-of-service against expo… Continue reading Security Advisory: Targeting AD FS With External Brute-Force Attacks

Lightbox Adware – From Innocent Scripts to Malicious Redirects

It’s no news that webmasters commonly make use of external scripts to add more features to their site, but things can turn out for the worse quite easily.
What if other scripts start behaving the same?
What if they start to use your website to s… Continue reading Lightbox Adware – From Innocent Scripts to Malicious Redirects

How to Easily Bypass EPA to Compromise any Web Server that Supports Windows Integrated Authentication

As announced in our recent security advisory, Preempt researchers discovered how to bypass the Enhanced Protection for Authentication (EPA) mechanism to successfully launch NTLM relay attacks on any server that supports WIA (Windows Integrated Aut… Continue reading How to Easily Bypass EPA to Compromise any Web Server that Supports Windows Integrated Authentication

FTP Logs Used to Determine Attack Vector

Logs can be very useful because they are a record of what was done by whom. They are especially useful when you need to find out more on how a website has been compromised. Since our job at Sucuri is to clean website malware, we don’t have any a… Continue reading FTP Logs Used to Determine Attack Vector

Reset Email Account Passwords After a Website Malware Infection

It’s not uncommon for bad actors to use compromised websites to send large amounts of email spam. This can cause major headaches for website owners — spam can lead to the blacklisting of a web host’s mail server IPs, or the domain na… Continue reading Reset Email Account Passwords After a Website Malware Infection

PCI for SMB: Requirement 12 – Maintain an Information Security Policy

Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessmen… Continue reading PCI for SMB: Requirement 12 – Maintain an Information Security Policy

From .tk Redirects to PushKa Browser Notification Scam

In the past couple of years, we’ve been tracking a long-lasting campaign responsible for injecting malicious scripts into WordPress sites.
This campaign leverages old vulnerabilities (patched a long time ago) found in a variety of outdated theme… Continue reading From .tk Redirects to PushKa Browser Notification Scam