Best WordPress Hosting
 

The Dangers of Installing Nulled WordPress Themes and Plugins

Nulled WordPress themes and plugins are a controversial topic for many in the web development world — and arguably one of the bigger threats to WordPress security. Essentially modified versions of official WordPress themes and plugins with their licensing restrictions Continue reading The Dangers of Installing Nulled WordPress Themes and Plugins

Bogus URL Shorteners Redirect Thousands of Hacked Sites in AdSense Fraud Campaign

Late last year we reported on a malware campaign targeting thousands of WordPress websites to redirect visitors to bogus Q&A websites. The sites themselves contained very little useful information to a regular visitor, but — more importantly — also contained Continue reading Bogus URL Shorteners Redirect Thousands of Hacked Sites in AdSense Fraud Campaign

Konami Code Backdoor Concealed in Image

Attackers are always looking for new ways to conceal their malware and evade detection, whether it’s through new forms of obfuscation, concatenation, or — in this case — unorthodox use of image file extensions. One of the most common backdoors Continue reading Konami Code Backdoor Concealed in Image

Massive Campaign Uses Hacked WordPress Sites as Platform for Black Hat Ad Network

Every so often attackers register a new domain to host their malware. In many cases, these new domains are associated with specific malware campaigns, often related to redirecting legitimate website traffic to third party sites of their choosing — including Continue reading Massive Campaign Uses Hacked WordPress Sites as Platform for Black Hat Ad Network

Vulnerable WordPress Sites Compromised with Different Database Infections

Vulnerabilities within WordPress can lead to compromise, and oftentimes known vulnerabilities are utilized to infect WordPress sites with more than one infection. It is common for out of date websites to be attacked by multiple threat actors or targeted by Continue reading Vulnerable WordPress Sites Compromised with Different Database Infections

Finding & Removing Malware From Weebly Sites

Weebly is an easy-to-use website builder that allows admins to quickly create and publish responsive blogs and sites. Website builder environments are usually considered to be very safe and not prone to malware infections, but during a recent investigation I Continue reading Finding & Removing Malware From Weebly Sites

Fake jQuery Domain Redirects Site Visitors to Scam Pages

A recent infection has been making its rounds across vulnerable WordPress sites, detected on over 160 websites so far at the time of writing. The infection is injected at the top of legitimate JavaScript files and executes a script from Continue reading Fake jQuery Domain Redirects Site Visitors to Scam Pages

Backdoor Targets FreePBX Asterisk Management Portal 

Written in PHP and JavaScript, FreePBX is a web-based open-source GUI that manages Asterisk, a voice over IP and telephony server. This open-source software allows users to build customer phone systems. During a recent investigation, I came across a simple Continue reading Backdoor Targets FreePBX Asterisk Management Portal 

How to Securely Shop With Your Credit Card: Use a Virtual Card & Check for Skimmers

The convenience and ease of online transactions has drawn a tremendous number of users to online ecommerce storefronts. And during the pandemic, many consumers switched to online purchases in favor of shopping at regular brick and mortar shops — leading Continue reading How to Securely Shop With Your Credit Card: Use a Virtual Card & Check for Skimmers

Infected WordPress Plugins Redirect to Push Notification Scam

Attackers are always finding unique ways to avoid detection. Our teams regularly find malware on compromised websites which have been obfuscated to make it more difficult for webmasters to detect or understand. Obfuscation can take many forms, such as encrypting Continue reading Infected WordPress Plugins Redirect to Push Notification Scam

Chinese Gambling Spam Targets World Cup Keywords

Since 2018, our team has been tracking an interesting type of website infection where the tag of a hacked website is changed to Chinese text — changes which are clearly seen in the website’s search results and source code. However, Continue reading Chinese Gambling Spam Targets World Cup Keywords

New Wave of SocGholish cid=27x Injections

On November 15th, Ben Martin reported a new type of WordPress infection resulting in the injection of SocGholish scripts into web pages. The attack loads zipped malicious templates from WordPress theme and fake plugins files before extracting the SocGholish script, Continue reading New Wave of SocGholish cid=27x Injections

How to Fix the “This Site May Harm Your Computer” Warning

Most modern web browsers and search authorities like Google have a vested interest in protecting their users from malware. Warning messages like “This site may harm your computer” are a clear way for services to educate and protect end users Continue reading How to Fix the “This Site May Harm Your Computer” Warning

New SocGholish Malware Variant Uses Zip Compression & Evasive Techniques

Readers of this blog should already be familiar with SocGholish: a widespread, years-long malware campaign aimed at pushing fake browser updates to unsuspecting web users. Once installed, fake browser updates infect the victim’s computer with various types of malware including Continue reading New SocGholish Malware Variant Uses Zip Compression & Evasive Techniques

Massive ois[.]is Black Hat Redirect Malware Campaign

Since September 2022, our research team has tracked a surge in WordPress malware redirecting website visitors to fake Q&A sites via ois[.]is. These malicious redirects appear to be designed to increase the authority of the attacker’s sites for search engines. Continue reading Massive ois[.]is Black Hat Redirect Malware Campaign

Black Friday & Cyber Monday Ecommerce Security Threats

Consumers spent a whopping $33.9 billion during Cyber Week last year. With the average adult spending $430 on Black Friday alone, this period remains one of the biggest online shopping events of the year. Unfortunately, hackers are making bank alongside Continue reading Black Friday & Cyber Monday Ecommerce Security Threats

Wordfence Evasion Malware Conceals Backdoors

Malware authors, with some notable exceptions, tend to design their malicious code to hide from sight. The techniques they use help their malware stay on the victim’s website for as long as possible and ensure execution. For example — obfuscation Continue reading Wordfence Evasion Malware Conceals Backdoors

New Malware Variants Serve Bogus CloudFlare DDoS Captcha

The attack is simple: when browsing an infected website, the user receives a notification that insists they must download a file to continue to access the content. What they don’t know is that the file is actually a Remote Access Continue reading New Malware Variants Serve Bogus CloudFlare DDoS Captcha

Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]

Bad actors often look for clever ways to boost the rankings and visibility of their spam pages in search. One of the many black hat SEO injections that we regularly find on compromised sites involves spammy links hidden inside a Continue reading Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]

What Is Clickjacking and How Do I Prevent It?

There are a plethora of techniques that attackers use to redirect site visitors and harvest sensitive information on compromised websites. But when most webmasters think about securing their website, they often don’t think about how attackers can inject clicks on Continue reading What Is Clickjacking and How Do I Prevent It?