WordPress Sites Hacked to Redirect Visitors to Scam Sites.

0
3401

Breached over 6,500 websites..
Infects files such as jquery.min.js.
Malicious JavaScript.

Introduction:
Cybersecurity researchers have disclosed a massive campaign that is responsible for injecting malicious JavaScript code into compromised WordPress websites that redirects visitors to scam pages and other malicious websites to generate illegitimate traffic. The websites all shared a common issue: malicious JavaScript had been injected within their website’s files and the database, including legitimate core WordPress files.

Details:
This involved infecting files such as jquery.min.js and jquery-migrate.min.js with obfuscated JavaScript that is activated on every page load, allowing the attacker to redirect the website visitors to a destination of their choice.

Currently:
The GoDaddy-owned website security company said that the domains at the end of the redirect chain could be used to load advertisements, phishing pages, malware, or even trigger another set of redirects.

Additional Security Info:
In some instances, unsuspecting users are taken to a rogue redirect landing page containing a fake CAPTCHA check, clicking which serves unwanted ads that are disguised to look as if they come from the operating system and not from a web browser.

Closing:
The campaign is believed to have impacted 322 websites so far, starting May 9. The April set of attacks, on the other hand, has breached over 6,500 websites. It has been found that attackers are targeting multiple vulnerabilities in WordPress plugins and themes to compromise the website and inject their malicious scripts.

Reference link for the full story:
Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites

This information is brought to you by Vectech Solutions, The Gold Standard in Cybersecurity

#godaddy #javascript #wordpress