A Large number of WordPress websites were compromised in last two weeks with a new malware campaign spotted in the wild.
WordPress, a Free and Open source content management system (CMS) and blogging tool, has been once again targeted by hackers at large scale.
Researchers at Sucuri Labs have detected a “Malware Campaign” with an aim of getting access to as many devices they can by making innumerable WordPress websites as its prey. The Malware campaign was operational for more than 14 days ago, but it has experienced a massive increase in the spread of infection in last two days, resulted in affecting more than 5000 Wordpress websites. In April the US Federal Bureau of Investigation released a public service announcement to the public about a large number of websites being exploited and compromised through WordPress plugin vulnerabilities.
Though if we go by the name, it’s meaning can be extracted as tracking every visitor who accesses the victimized WordPress sites and further redirects them to the specially crafted page where the Nuclear Exploit Kit is planted.
So, Plan of Action is:
If Introspect, we'll notice that the exploit kit being used here can deploy attacks through vulnerabilities in plugins with an aim of data exfiltration. The Sucuri researchers team as a solution suggest, “The infection is very buggy and often removed single-quotes from legitimate files that corrupt the site completely.
Affects plugins, themes and even core files of WordPress and Joomla. The solution is to restore files from a clean backup.” Moreover, to check if you are affected by the attack follow the below-mentioned command: (user with Admin rights can access) grep -r “visitorTracker_isMob” /var/www/
Additionally, as a prevention: