FTP Logs Used to Determine Attack Vector

Logs can be very useful because they are a record of what was done by whom. They are especially useful when you need to find out more on how a website has been compromised. Since our job at Sucuri is to clean website malware, we don’t have any a… Continue reading FTP Logs Used to Determine Attack Vector

Korean Gambling and Call Girl Spam on Hacked and Non-hacked Sites

This blog post talks about how a web spam campaign that targets only one country may create problems for sites owners around the world — even if their site is not hacked.
It all began with a pretty regular sample of an infected WordPress index.p… Continue reading Korean Gambling and Call Girl Spam on Hacked and Non-hacked Sites

Closed Source E-commerce Platforms Can Be Compromised

These days, the majority of store owners opt-in for the easiest closed-source ecommerce platform options.
For the most part, these platforms typically allow users to customize a template, as well as add images, videos, and some external content via ap… Continue reading Closed Source E-commerce Platforms Can Be Compromised

WordPress Hacks: 5 Ways to Protect WordPress from Hacking

WordPress is one of the most popular content management systems (CMS) out there. That’s why it is vital to prevent WordPress hacking.
Statistically, over 33% of websites currently run on WordPress.
This post is not a “one size fits all&#82… Continue reading WordPress Hacks: 5 Ways to Protect WordPress from Hacking

PHP Backdoor Evaluates XOR Encrypted Requests

In the past, we’ve mentioned how the PHP XOR bitwise operator (represented by the caret ^)  can be used to encrypt a malware’s source code. This operator makes it more difficult to determine if encrypted code is malicious, or if it is… Continue reading PHP Backdoor Evaluates XOR Encrypted Requests

Return to the City of Cron – Malware Infections on Joomla and WordPress

We recently had a client that had a persistent malware infection on their shared hosting environment that would re-infect the files quickly after we had cleaned them. The persistence was being created by a cron that was scheduled to download malware f… Continue reading Return to the City of Cron – Malware Infections on Joomla and WordPress

.htaccess Injector on Joomla and WordPress Websites

During the process of investigating one of our incident response cases, we found an .htaccess code injection. It had been widely spread on the website, injected into all .htaccess files and redirecting visitors to the http[:]//portal-f[.]pw/XcTyTp adv… Continue reading .htaccess Injector on Joomla and WordPress Websites

.htaccess Injector on Joomla and WordPress Websites

During the process of investigating one of our incident response cases, we found an .htaccess code injection. It had been widely spread on the website, injected into all .htaccess files and redirecting visitors to the http[:]//portal-f[.]pw/XcTyTp adv… Continue reading .htaccess Injector on Joomla and WordPress Websites

Slimstat: Stored XSS from Visitors

The WordPress Slimstat plugin, which currently has over 100k installs, allows your website to gather analytics data for your WordPress website. It will track certain information such as the browser and operating system details, plus page visits to opt… Continue reading Slimstat: Stored XSS from Visitors