Friday, 6 May 2016

Malware Infection Alert: WordPress Redirect Hack via Test0.com/Default7.com

Real People. Real Security.

Malware Infection Alert:
WordPress Redirect Hack via Test0.com/Default7.com

Hi, 

This email is to notify you of a malware campaign targeting WordPress websites, in which the attackers are injecting a highly conditional malicious redirect. It randomly affects your users, and pushes them to default7 (.)com / test0 (.)com / test246 (.)com domains, in which they then perform a Drive-by-Download attack on the user - targeting vulnerabilities in Flash and Java.  

In all cases, the malware injects 10-12 lines of code at the top of the header.php file of the current WordPress theme.

Please take a few minutes to read the following release, and check your environments. 

- Sucuri Security Team

Read More About This Alert
Websites behind the Sucuri Firewall have been protected against this threat

via our Virtual Hardening / Patching technology. 
 
Protect Your Site With Sucuri
This email does not mean you are affected!

Being proactive in the protection of your site is of one of the most important aspects of having a solid security posture. Therefore, we feel it's important to research and report on all potential threats as quickly as possible.
Facebook
Facebook
Sucuri
Sucuri
Website
Website
Sucuri Labs
Sucuri Labs
Email
Email
LinkedIn
LinkedIn
Share
Tweet
Forward
Copyright © 2016 Sucuri Security, All rights reserved.
The user subscribes to this list to stay current with the latest in security news.

Our mailing address is:
Sucuri Security
30141 Antelope RD
Suite D, #680
Menifee, CA 92584

Add us to your address book


unsubscribe from this list    update subscription preferences