50,000 sites compromised in sustained attack

Powered by SC Magazine
 

WordPress, other plugins targeted.

Some 50,000 websites have been compromised as part of a sustained iframe injection attack campaign targeting vulnerable plug-ins for web servers and content management systems.

Attackers targeted holes in a string of plug-ins for blogging software — such as WordPress— including timthumb, uploadify and phpmyadmin.

When one was discovered, attackers would inject a malicious file and an iframe to link the compromised sites. Various browser-based attacks, including drive-by downloads, were also added.

At least 4000 new websites were infected each day, Sucuri malware researcher Daniel Cid told SC.

“So we believe that there are more than 50,000 sites compromised as part of this botnet,” Cid said.

“When all is said and done, you have a large network of compromised sites, all linking to each other and all with the same malware.”

He said a further 5000 were compromised today using the below malicious iframe.

 

 

Many of the queries probed for web hosting software Plesk, a finding backed by the Sans Internet Storms Centre that noted a sharp uptick in requests over port 8443, used by Plesk.

Vulnerabilities in WordPress plugins have been long understood. Last year, large malware campaigns including the LizaMoon attacks exploited those holes, while in November thousands of WordPress sites were hijacked through vulnerable instances of the TimThumb image resizer tool.

Copyright © SC Magazine, Australia


50,000 sites compromised in sustained attack
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 338

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote