Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Keylogger Found on Nearly 5,500 Infected WordPress Sites
#1
https://www.bleepingcomputer.com/news/se...ess-sites/     Keylogger Found on Nearly 5,500 Infected WordPress Sites
By Catalin Cimpanu  
December 6, 2017 08:10 PM 0
Nearly 5,500 WordPress sites are infected with a malicious script that logs keystrokes and sometimes loads an in-browser cryptocurrency miner.

The malicious script is being loaded from the "cloudflare.solutions" domain, which is not affiliated with Cloudflare in any way, and logs anything that users type inside form fields as soon as the user switches away from an input field.

The script is loaded on both a site's frontend and backend, meaning it can also log usernames and passwords when logging into a site's admin panel.

Keylogger on WordPress site

The script is also dangerous when left to run on the frontend. While on most WordPress sites the only place it could steal user data is from comment fields, some WordPress sites are configured to run as online stores. In these instances, attackers can log credit card data and personal user details.

Most of these incidents occurred because hackers compromised WordPress sites through various means and hid the malicious script inside functions.php, a standard file found in all WordPress themes.

Attacker(s) has been active since April
These attacks aren't new. Sucuri has tracked at least three different malicious scripts hosted on the cloudflare.solutions domain.

The first one took place in April, and attackers used the malicious JavaScript file to embed banner ads on hacked sites.

By November, the same group had changed tactics and was loading malicious scripts disguised as fake jQuery and Google Analytics JavaScript files that were actually a copy of the Coinhive in-browser cryptocurrency miner. By November 22, that campaign was spotted on 1,833 sites.

In this latest series of attacks, also detected by Sucuri, hackers have kept the cryptojacking script in place, but have also added the keylogger component.

Script active on nearly 5,500 WordPress sites
According to PublicWWW, this malicious script version is currently active on 5,496 sites, most ranked outside the Alexa Top 200,000.

Sucuri experts provide the following mitigation advice for owners who spot scripts loaded on their sites from the cloudflare.solutions domain.

As we already mentioned, the malicious code resides in the function.php file of the WordPress theme. You should remove the add_js_scripts function and all the add_action clauses that mention add_js_scripts. Given the keylogger functionality of this malware, you should consider all WordPress passwords compromised so the next mandatory step of the cleanup is changing the passwords (actually it is highly recommended after any site hack). Don’t forget to check your site for other infections too.     Oh no Eek Cry Shock Shock 3 Faint Fart Poop
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  8 New Android Apps Found Infected with Joker Malware mrtrout 0 727 06-22-2021 , 11:15 PM
Last Post: mrtrout
  Active Exploits Hit WordPress Sites Vulnerable to Thrive Themes Flaws Bjyda 0 864 03-28-2021 , 12:06 PM
Last Post: Bjyda
  WordPress Plugin Bug Allows Malicious Code Injection on 100K Sites sidemoon 0 1,370 03-13-2020 , 10:00 PM
Last Post: sidemoon
  Critical Bugs in WordPress Plugins Let Hackers Take Over Sites tarekma7 0 1,218 02-29-2020 , 07:22 PM
Last Post: tarekma7
  Many servers infected with new ransomware dhruv2193 1 1,454 09-08-2019 , 10:24 PM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)