thousands-of-wordpress-websites-infected-with-malware

The malicious software comprises four distinct backdoors:

The presence of four backdoors enables the attackers to have several avenues of re-entry in case one is detected and eliminated. This is a unique occurrence we’ve not encountered previously. It also introduces an additional type of assault made feasible by exploiting websites that fail to monitor third-party dependencies within the users’ browsers.

The four backdoors:

The functionalities of the four backdoors are detailed below:

  • Backdoor 1, which uploads and installs a counterfeit plugin named “Ultra SEO Processor,” subsequently used to carry out commands issued by the attacker.
  • Backdoor 2, which injects harmful JavaScript into wp-config.php.
  • Backdoor 3, which places an attacker-controlled SSH key into the ~/.ssh/authorized_keys file to enable continuous remote access to the system.
  • Backdoor 4, which is intended to execute commands remotely and retrieves another payload from gsocket[.]io, likely to initiate a reverse shell.

Leave a Reply

Your email address will not be published. Required fields are marked *

Share This