HomeVulnerabilityHackers exploit WordPress plugin flaw to contaminate 3,300 websites with malware

Hackers exploit WordPress plugin flaw to contaminate 3,300 websites with malware

Hackers are breaching WordPress websites by exploiting a vulnerability in outdated variations of the Popup Builder plugin, infecting over 3,300 web sites with malicious code.

The flaw leveraged within the assaults is tracked as CVE-2023-6000, a cross-site scripting (XSS) vulnerability impacting Popup Builder variations 4.2.3 and older, which was initially disclosed in November 2023.

A Balada Injector marketing campaign uncovered at the beginning of the yr exploited the actual vulnerability to infect over 6,700 web sites, indicating that many web site admins hadn’t patched shortly sufficient.

Sucuri now studies recognizing a brand new marketing campaign with a notable uptick prior to now three weeks, concentrating on the identical vulnerability on the WordPress plugin.

In response to PublicWWW outcomes, code injections linked to this newest marketing campaign are to be present in 3,329 WordPress websites, with Sucuri’s personal scanners detecting 1,170 infections.

Injection particulars

The assaults infect the Customized JavaScript or Customized CSS sections of the WordPress admin interface, whereas the malicious code is saved inside the ‘wp_postmeta’ database desk.

See also  HPE warns of vital RCE flaws in Aruba Networking entry factors

The first operate of the injected code is to behave as occasion handlers for numerous Popup Builder plugin occasions, equivalent to ‘sgpb-ShouldOpen’, ‘sgpb-ShouldClose’, ‘sgpb-WillOpen’, ‘sgpbDidOpen’, ‘sgpbWillClose’, and ‘sgpb-DidClose.’

By doing that, malicious code executes at particular actions of the plugin, like when a popup opens or closes.

Sucuri says the precise actions of the code might range, however the main goal of the injections seems to be redirecting guests of contaminated websites to malicious locations equivalent to phishing pages and malware-dropping websites.

Particularly, in some infections, the analysts noticed the code injecting a redirect URL (hxxp://ttincoming.traveltraffic[.]cc/?visitors) because the ‘redirect-url’ parameter for a “contact-form-7” popup.

One variant of the injection
One variant of the injection (Sucuri)

The injection above retrieves the malicious code snippet from an exterior supply and injects it into the webpage head for execution by the browser.

Virtually, it’s doable for the attackers to attain a variety of malicious targets by means of this technique, many doubtlessly being extra extreme than redirections. 

See also  Google Introduces Mission Naptime for AI-Powered Vulnerability Analysis

Defending

The assaults originate from the domains “ttincoming.traveltraffic[.]cc” and “host.cloudsonicwave[.]com,” so blocking these two is advisable.

If you happen to’re utilizing the Popup Builder plugin in your web site, improve to the most recent model, at the moment 4.2.7, which addresses CVE-2023-6000 and different security issues.

WordPress stats present that a minimum of 80,000 lively websites at the moment use Popup Builder 4.1 and older, so the assault floor stays important.

Within the case of an an infection, elimination entails deleting malicious entries from the Popup Builder’s customized sections and scanning for hidden backdoors to stop reinfection.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular