web analytics
Home » Technology » Thousand of WordPress sites become a victim to malicious code

Thousand of WordPress sites become a victim to malicious code

WordPress

A large number of WordPress sites have been hacked and compromised with malicious code this month, as per security specialists at Sucuri and Malwarebytes.

All compromises appear to take after a comparable example – to stack malicious code from a known threat actor – in spite of the fact that the passage vector for every one of these occurrences has all the earmarks of being extraordinary.

Specialists trust gatecrashers are accessing these sites not by abusing flaws in the WordPress CMS itself, yet vulnerabilities in obsolete themes and plugins. When they access a site, they plant an backdoor access for future access and make adjustments to the site’s code.

Much of the time, they alter PHP or JavaScript files to stack malicious code, albeit a few clients have detailed seeing adjustments made to database tables too.

Malwarebytes security specialist Jérôme Segura said this malicious code filters clients visiting the compromised off sites and diverts some to technical support tricks.

Segura also said that some of tech support scams that users are landing on are using the “evil cursor” Chrome bug to prevent users from closing the malicious site’s tab, a trick that the researcher first spotted last week.

Googling only one of the bits of the malignant JavaScript code added to the hacked WordPress sites uncovers only a little part of the aggregate number of hacked websites.

The WordPress scam has seen to started this month and only intensified in the past few days with thousands of websites being compromised and hacked by hackers. Some of the traffic patterns during the redirection process found to mimic that of well-known traffic distribution systems used by many malware distribution campaigns.

Read: Fortnite suspends Shadow Stones capability after permanent invisibility fiasco

Image via WP Hack Helped