JavaScript Malware Switches to Server-Side Redirects & DNS TXT Records as TDS
Sucuri Blog » Malware
by Denis Sinegubko
1w ago
Last August we documented a malware campaign that was injecting malicious JavaScript code into compromised WordPress sites to redirect site visitors to VexTrio domains. The most interesting thing about that malware was how it used dynamic DNS TXT records of the tracker-cloud[.]com domain to obtain redirect URLs. We’ve been tracking this campaign ever since — and we’ve recorded multiple changes in obfuscation techniques and domain names used in their DNS TXT traffic direction system (TDS ..read more
Visit website
Credit Card Skimmer Hidden in Fake Facebook Pixel Tracker
Sucuri Blog » Malware
by Matt Morrow
2w ago
In recent months, we have encountered a number of cases where attackers inject malware into website software that allows for custom or miscellaneous code — for example, the miscellaneous scripts area of the Magento admin panel, or WordPress plugins such as Custom CSS & JS. Custom script editors are popular with bad actors because they allow for external third party (and malicious) JavaScript and can easily pretend to be benign by leveraging naming conventions that match popular scripts like Google Analytics or libraries like JQuery ..read more
Visit website
Web Shells: Types, Mitigation & Removal
Sucuri Blog » Malware
by Cesar Anjos
2w ago
Web shells are malicious scripts that give attackers persistent access to compromised web servers, enabling them to execute commands and control the server remotely. These scripts exploit vulnerabilities like SQL injection, remote file inclusion (RFI), and cross-site scripting (XSS) to gain entry. Once deployed, web shells allow attackers to manipulate the server, leading to data theft, website defacement, or serving as a launchpad for further attacks. Given their stealth and versatility across various programming languages (PHP, Python, Ruby, ASP, Perl, Bash), web shells pose a significant t ..read more
Visit website
Sign1 Malware: Analysis, Campaign History & Indicators of Compromise
Sucuri Blog » Malware
by Ben Martin
1M ago
A new client recently came to us reporting seemingly random pop ups occurring on their website. While it was clear that there was something amiss with the website it was difficult to reproduce the issue. However, by inspecting our server side scanner logs we were able to locate the source of the unwanted behavior — and it turned out to be a remarkably interesting JavaScript injection related to a massive malware campaign that we internally call Sign1 ..read more
Visit website
What is .htaccess Malware? (Detection, Symptoms & Prevention)
Sucuri Blog » Malware
by Ben Martin
1M ago
The .htaccess file is notorious for being targeted by attackers. Whether it’s using the file to hide malware, redirect search engines to other sites with black hat SEO tactics, or inject content — the range of possibilities for misuse is vast, making it a prime target for hackers. .htaccess malware can be hard to pinpoint and clean up since it allows an attacker to make multiple changes to the web server and its behavior ..read more
Visit website
New Malware Campaign Found Exploiting Stored XSS in Popup Builder < 4.2.3
Sucuri Blog » Malware
by Puja Srivastava
1M ago
In January, my colleague reported about a new Balada Injector campaign found exploiting a recent vulnerability in the widely-used Popup Builder WordPress plugin which was initially disclosed back in November, 2023 by Marc Montpas. In the past three weeks, we’ve started seeing an uptick in attacks from a new malware campaign targeting this same Popup Builder vulnerability. According to PublicWWW, over 3,300 websites have already been infected by this new campaign. Our own SiteCheck remote malware scanner has detected this malware on over 1,170 sites ..read more
Visit website
From Web3 Drainer to Distributed WordPress Brute Force Attack
Sucuri Blog » Malware
by Denis Sinegubko
1M ago
Two weeks ago we discussed a new development in website hacks: Web3 crypto wallet drainers. We’ve been closely following the most significant variant which injects drainers using the external cachingjs/turboturbo.js script. Our SiteCheck website scanner has already detected this version on over 1,200 sites since the beginning of February, 2024. Since our last post, this malware campaign has seen two new iterations resulting in distributed brute force attacks against target WordPress websites from the browsers of completely innocent and unsuspecting site visitors ..read more
Visit website
New Wave of SocGholish Infections Impersonates WordPress Plugins
Sucuri Blog » Malware
by Ben Martin
1M ago
SocGholish malware, otherwise known as “fake browser updates”, is one of the most common types of malware infections that we see on hacked websites. This long-standing malware campaign leverages a JavaScript malware framework that has been in use since at least 2017. The malware attempts to trick unsuspecting users into downloading what is actually a Remote Access Trojan (RAT) onto their computers, which is often the first stage in a ransomware infection. Late last week our incident response team identified a fresh wave of SocGholish (fake browser update) infections targeting WordPress websit ..read more
Visit website
What is HTTP Error 403 & How to Fix It
Sucuri Blog » Malware
by Rianna MacLeod
1M ago
Error 403 – Forbidden can be a frustrating interruption to anyone’s day. This common error can lead to exasperated website visitors, even resulting to lost traffic and website revenue depending on which page of your site is affected. When you (or your site visitors) encounter an unexpected error 403 message, it’s important to assess the issue promptly just in case it’s a symptom of a more serious issue on your site ..read more
Visit website
Web3 Crypto Malware: Angel Drainer – From Phishing Sites to Malicious Injections
Sucuri Blog » Malware
by Denis Sinegubko
2M ago
Since January 2024, there has been a notable surge in attacks by a novel form of website malware targeting Web3 and cryptocurrency assets. This malware, spread across multiple campaigns, uses crypto drainers to steal and redistribute assets from compromised wallets. The strategy involves either injecting drainers directly into compromised websites or redirecting site visitors to Web3 phishing sites that contain drainers. This recent surge in malicious activity is marked by the use of crypto drainers like Angel Drainer, which has been implicated in recent security breaches including the Decemb ..read more
Visit website

Follow Sucuri Blog » Malware on FeedSpot

Continue with Google
Continue with Apple
OR