Recently, researchers announced that
more than 2000 websites running WordPress are infected with Malware. WordPress
is an open source software used to create websites for a variety of items.
"The malware in question logs passwords and just about anything else an
administrator or visitor types."
This is the second time in a matter of
month this particular malware was found on WordPress sites. The first time it
was found on 5, 500 sites back in December of 2017. This was remediated when
the site used to host the scripts was taken down. At this point, these new
cases have no connection to the previous incidents as these malicious scripts
are found on three new sites.
"Attackers inject the cdjs[.]online
script into either a site's WordPress database (wp_posts table) or into the
theme's functions.php file, as was the case in the December attack that used
the cloudflare[.]solutions site. Sinegubko also found the cdns[.]ws and
msdns[.]online scripts injected into the theme's functions.php file. Besides
logging keystrokes typed into any input field, the scripts load other code that
causes site visitors to run JavaScript from Coinhive that uses visitors'
computers to mine the cryptocurrency Monero with no warning." (Goodin,
2018)
It appears these incidents are allowing
the scripts due to the lack of maintenance on the sites. According to the
researchers for these cases, many of the sites are simply not using current
software. "Rate shows that there are still many sites that have failed to
properly protect themselves after the original infection," (Goodin, 2018)
This goes to show one must always ensure they have the latest software in order
to protect them and any other folks who might be visiting their site
References:
Goodin, D.
(2018, January 29). More than 2,000 WordPress websites are infected with a
keylogger. Retrieved February 05, 2018, from
https://arstechnica.com/information-technology/2018/01/more-than-2000-wordpress-websites-are-infected-with-a-keylogger/
Comments
Post a Comment