Feeds

Hackers booby-trap WordPress site with botnet-weaving Trojan

Crooks lure punters in with LinkedIn lies

Build a business case: developing custom apps

Malware-flingers are taking advantage of vulnerable WordPress sites as part of an attack ultimately designed to spread an information-stealing botnet agent.

Cybercrooks begin the attack by planting malicious scripts on vulnerable sites. Prospective marks are then lured to compromised sites via spammed messages that purport to come from known legitimate sources including Better Business Bureau and LinkedIn, among others. The crooks use social engineering tactics to entice unsuspecting users to click the link found in the email.

Clicking on links in these spam messages points surfers towards compromised WordPress sites – and not the legitimate sites users might have expected to visit. Redirection scripts on compromised sites expose surfers to a variety of drive-by download attacks that attempt to take advantage of well-known (and already patched) Adobe Reader and Windows flaws to drop malware onto poorly secured Windows PCs.

The attack, which uses the infamous Blackhole Exploit kit, is geared towards spreading the Cridex Trojan, an information-stealing strain of malware. Cridex established a botnet using compromised Windows boxen, as explained in a write-up by Trend Micro.

"This malware intercepts browser requests and changes the displayed content according to the configuration, written by the administrator of the botnet," Trend explains. "This way, cybercriminals can trick users into entering valuable information without raising suspicion. It was also found to generate several random domains using domain generating algorithms (DGA)."

A full write-up of the attack, complete with screenshots of spam samples that have featured in the attack, can be found in a blog post by Trend Micro here.

More on the Cridex Trojan can be found in an earlier blog post by M86 Security here.

Earlier this month, Websense warned that vulnerable WordPress content management systems are being abused to promote fake anti-virus (AKA scareware) scams.

"The majority of targets are websites hosted by the WordPress content management system, it said. "At the time of writing, more than 200,000 web pages have been compromised, amounting to close to 30,000 unique websites (hosts). The injection hijacks visitors to the compromised sites and redirects them to rogue AV sites that attempt to trick them into downloading and installing a Trojan onto their computer." ®

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Know what Ferguson city needs right now? It's not Anonymous doxing random people
U-turn on vow to identify killer cop after fingering wrong bloke
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.