WordPress patches amid huge spike in redirects to malware sites

US-CERT is urging WordPress admins update the publishing software after a recent spike in infected WordPress sites that redirect visitors to a dangerous exploit kit known as Nuclear.

WordPress released version 4.4.2 on Tuesday to address flaws that left instances vulnerable to an “open redirection attack” bug and a “possible” Server Side Request Forgery (SSRF).

Open redirects are a lingering problem for web applications, and as the name suggests rely on exploiting a vulnerable web page to redirect a visitor to an malicious page. They’re often accompanied by a phishing attack, security firm Qualys recently explained.

WordPress remains one of the more popular publishing platforms on the web and installations have in the past been abused to spread malware, which is likely why US-CERT urged admins to upgrade as soon as possible to version 4.4.2.

The security update may help explain a mysterious spike in WordPress infections. Just a day before WordPress’ patch, security firm Securi warned of a rash of WordPress sites that had been infected with malware appended to legitimate JavaScript files. WordPress sites were being reinfected even after removing the malware, it noted.

Security firm Malwarebytes followed up that report noting that the infected WordPress sites were in fact redirecting visitors to pages hosting fraudulent ads that ultimately flicked them to a secondary site that hosted Nuclear— a nasty exploit that serves up a smorgasbord of threats, including the CryptoWall 4.0 file-encrypting malware.

“WordPress sites are injected with huge blurbs of rogue code that performs a silent redirection to domains appearing to be hosting ads. This is a distraction (and fraud) as the ad is stuffed with more code that sends visitors to the Nuclear Exploit Kit,” explained Jerome Segura, senior security researcher at Malwarebytes.

Denis Sinegubko, a senior malware researcher with Securi, said the malware only infected first time visitors to an infected site. Meanwhile, WordPress admins would have found that they’re web server will continuously be reinfected even after attempting to clean up the malware.

The malware is particularly troublesome for WordPress users that host several domains on the same hosting account since it attempts to infect all accessible JavaScript files.

“It’s not enough to clean just one site (e.g. the one you care about) or all but one (e.g. you don’t care about a test or backup site) in such situations – an abandoned site will be the source of the reinfection. In other words, you either need to isolate every sites or clean/update/protect all of them at the same time,” he said.

In any case, if WordPress admins haven’t already updated their software, this attack should give them cause to do so.

Participate in CSO and Gigamon's survey on Security Priorities today!

Read more: The week in security: 8 in 10 health apps insecure; ISIS sidesteps backdoor debate

Go into the draw for a chance to win an Apple iWatch Sports or the equivalent of $500 Visa Cashcard.

For full terms and conditions click here.

Start survey NOW!

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags malwareWordpressvulnerableCSO AustraliaUS-CERT

More about AppleCSOGigamonMalwarebytesQualysVisa

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Liam Tung

Latest Videos

More videos

Blog Posts