uptick in WordPress compromises

“At the time of writing, the site is still delivering malware.”
BY Jérôme Segura
We’re seeing another uptick in WordPress compromises, using a slightly different modus operandi than the EITest campaign we recently blogged about, being responsible for a large number of infections via the Angler exploit kit.
The attack consists of a malicious script injected within compromised WordPress sites that launches another URL whose final purpose is to load the Angler exploit kit. Site owners that have been affected should keep in mind that those injected scripts/URLs will vary over time, although they are all using the same pattern (see IOCs below for some examples).
To read the entire article, please click here.
Source: https://blog.malwarebytes.org/

Facebooktwittergoogle_plusredditlinkedinmail