Connect with us
Almost 2000 WordPress sites are under crypto keylogger campaign exploitation 1 Almost 2000 WordPress sites are under crypto keylogger campaign exploitation 2

Security

Almost 2000 WordPress sites are under crypto keylogger campaign exploitation

Published

on

WordPress the most emerging content management service (cms) which is often preferred by most of the users to develop their websites, again got infected with an encrypted script that can run a keylogger and in-browser cryptocurrency miner.

It was first brought into the limelight by a group of infosec researchers, at Sucuri according to them it’s a cryptocurrency malicious script and a keylogger from Coinhive (a web-based service that provides website owners to embed java scripts on their website to use the resources of its site visitors to mine cryptocurrency) that runs in the background of admin pages on their interface which not only utilises the hardware resources of the users but also logs every keystrokes of the visitors.

Furthermore, back in December last year a similar cryptocurrency campaign occurred which infected more than 5,400 WordPress sites with a keylogger/cryptocurrency malware, here both the campaigns are incorporated to a domain that is used to serve up the malicious scripts known as “Cloudflare”.However, this isn’t that information security firm which deals with network management, as a matter of fact, these numbers of infected sites are just an approx estimation, it could even be higher, according to them.

Almost 2000 WordPress sites are under crypto keylogger campaign exploitation 3

Apart from that, later the keylogger was updated into the source code, in November, which uses the name of “cloudflare,” to spread this inevitable catastrophe, after including the keylogger, it tend to act like the previous one in similar way, which lead to a countless exploitation both on the admin login panel and also the frontend facing public sites credentials,

along with that many payment details including address and contact details were also compromised, specially for those who were running e-commerce stores on this platform, thus it created a fiasco over many sites who were unable to protect themselves from the original infection, according to ‘Denis Sinegubko’ a senior malware researcher at Sucuri.

Subsequently after this ravage on 8th December things turned out to be vulnerable when the “Cloudflare” domain was removed. Later on, according to the current reports the attackers who were behind this exploitation, manage to retain their original identity after the previous campaign got registered on three new domains (cdjs[.]online, cdns[.]ws & msdns[.]online) to host that malicious script which eventually ends up loading onto WordPress sites.

“Now attackers started injecting the cdjs[.]online on either WordPress database or theme’s function.php file and the ends[.]ws & the msdns[.]online scripts are injected into the theme’s function.php file, targeting those sites and plugins who didn’t updated to latest version and were comparatively weaker than other sites” according to ‘Sinegubko’

“Other than that he also added that the attacker also manipulated HTML to add Javascript code such as “googleanalytics.js” which loads the malicious scripts “starGoogleAnalytics” from the domain itself. It’s was also figured out that the library jquery-3.2.1.min.js is similar to the encrypted “CoinHive” cryptocurrency mining library from the previous version,”

Yet it isn’t confirmed that what was the actual ratio of infected sites by this campaign, though there are thousands of sites claimed to be infected by msdns[.]online, however, 129 websites and 103 websites were infected by cdns[.]ws and cdjs[.]online as per the reports of code search engine PublicWWW.

Overall keeping sites secure is definitely a hard deal nowadays for webmasters however there are few significant things that could prevent such infections not completely but to some extents.

One should always make sure that their whole site and software’s are properly updated to the latest version along with themes and plugins which in turn makes it helpful for sites to deal with these kinda vulnerabilities, it is also recommended checking if there is any unknown scripts actively running in the background. It’s advisable to change every single password of all WordPress sites and also precisely scan wp_posts table to ensure that there is no injection just for a safer side.

An obsessed infosec enthusiast whose often found crawling the web having an intense curiosity to get familiar with the technical concepts apart from being keen on exploring the depths of cyberspace.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

All the data shown above will be stored by DroidHolic on https://droidholic.com. At any point in time, you can contact us and select the data you wish to anonymize or delete so it cannot be linked to your email address any longer. When your data is anonymized or deleted, you will receive an email confirmation. We also use cookies and/or similar technologies to analyze customer behavior, administer the website, track users' movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

SUBSCRIBE TO OUR NEWSLETTER

Like DroidHolic on Facebook

Recent Posts