{"id":13400,"date":"2018-09-20T10:10:05","date_gmt":"2018-09-20T18:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/09\/20\/news-7167\/"},"modified":"2018-09-20T10:10:05","modified_gmt":"2018-09-20T18:10:05","slug":"news-7167","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/20\/news-7167\/","title":{"rendered":"Mass WordPress compromises redirect to tech support scams"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 20 Sep 2018 17:42:47 +0000<\/strong><\/p>\n<p>Content Management Systems (CMSes) such as WordPress, Drupal, or Joomla are under a constant barrage of fire. Earlier this year, we detailed several waves of attacks against Drupal, also known as <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/look-drupalgeddon-client-side-attacks\/\" target=\"_blank\" rel=\"noopener\">Drupalgeddon<\/a>, pushing browser-based miners and various social engineering threats.<\/p>\n<p>During the past few days, our crawlers have been catching a larger-than-usual number of WordPress sites being hijacked. One of the most visible client-side payloads we see are redirections to tech support scam pages. Digging deeper, we found that this is part of a series of attacks that have compromised thousands of WordPress sites since early September.<\/p>\n<h3>Multiple injections<\/h3>\n<p>The sites that are affected are running the WordPress CMS and often using outdated plugins. We were not able to figure out whether this campaign was made worse by the exploitation of a single vulnerability, although the recent <a href=\"https:\/\/blog.sucuri.net\/2018\/09\/outdated-duplicator-plugin-rce-abused.html\" target=\"_blank\" rel=\"noopener\">RCE for the Duplicator plugin<\/a> came to mind. Our friends over at Sucuri believe this is a <a href=\"http:\/\/labs.sucuri.net\/?note=2018-09-18\" target=\"_blank\" rel=\"noopener\">combination of multiple vectors<\/a>.<\/p>\n<p>Threat actors inject vulnerable sites in different ways. For example, on the client-side we see one large encoded blurb, usually in the HTML headers tag, and a one liner pointing to an external JavaScript.\u00a0Website owners are also <a href=\"https:\/\/stackoverflow.com\/questions\/52282559\/how-to-delete-script-injected-on-wordpress-site-ads-voipnewswire-net\" target=\"_blank\" rel=\"noopener\">reporting<\/a> malicious code within the wp_posts table of their WordPress database.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25589\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/attachment\/traffic-24\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic.png\" data-orig-size=\"654,741\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic-265x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic-530x600.png\" class=\"size-full wp-image-25589 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic.png\" alt=\"\" width=\"654\" height=\"741\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic-265x300.png 265w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/traffic-530x600.png 530w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<p>The domain <em>examhome[.]net<\/em> had a recent whois change (2018-09-16) and interesting nameservers:<\/p>\n<pre>1a7ea920.bitcoin-dns[.]hosting  a8332f3a.bitcoin-dns[.]hosting  ad636824.bitcoin-dns[.]hosting  c358ea2d.bitcoin-dns[.]hosting<\/pre>\n<p>The redirection flow shows further use of encoding to load <em>mp3menu[.]org<\/em> with a whois updated on 2018-09-15 and the following nameservers:<\/p>\n<pre>a8332f3a.bitcoin-dns[.]hosting  ad636824.bitcoin-dns[.]hosting<\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25584\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/attachment\/redir_to_tk_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_.png\" data-orig-size=\"637,808\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"redir_to_TK_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_-237x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_-473x600.png\" class=\"size-full wp-image-25584 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_.png\" alt=\"\" width=\"637\" height=\"808\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_.png 637w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_-237x300.png 237w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/redir_to_TK_-473x600.png 473w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/a><\/p>\n<p>That .TK URL pattern is well known and has been <a href=\"https:\/\/malware.dontneedcoffee.com\/hosted\/anonymous\/kotd.html\" target=\"_blank\" rel=\"noopener\">documented in detail<\/a>\u00a0as part of a large Traffic Distribution System (TDS) responsible for massive redirections to browlock pages. Note the custom mouse cursor (the &#8220;Evil cursor&#8221;), which we<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/partnerstroka-large-tech-support-scam-operation-features-latest-browser-locker\/\" target=\"_blank\" rel=\"noopener\"> reported on recently<\/a>, has yet to be patched.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25585\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/attachment\/browlock_-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_.png\" data-orig-size=\"649,598\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Browlock_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_-300x276.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_-600x553.png\" class=\"size-full wp-image-25585 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_.png\" alt=\"\" width=\"649\" height=\"598\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_.png 649w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_-300x276.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/Browlock_-600x553.png 600w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/a><\/p>\n<h3>Scope and mitigations<\/h3>\n<p>The number of WordPress sites that have been compromised is increasing in the last few days, suggesting that these are ongoing campaigns.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25581\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/attachment\/google_results\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results.png\" data-orig-size=\"788,856\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"google_results\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results-276x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results-552x600.png\" class=\"size-full wp-image-25581 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results.png\" alt=\"\" width=\"788\" height=\"856\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results.png 788w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results-276x300.png 276w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/google_results-552x600.png 552w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/a><\/p>\n<p>Website owners affected by these attacks will have to perform a thorough cleanup of injected pages, databases, and backdoors. More importantly, they will need to identify the root cause of the compromise, which often times is an outdated WordPress installation or plugin.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25583\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/attachment\/extension-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension.png\" data-orig-size=\"617,658\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"extension\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension-281x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension-563x600.png\" class=\"wp-image-25583 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension.png\" alt=\"\" width=\"403\" height=\"430\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension.png 617w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension-281x300.png 281w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/extension-563x600.png 563w\" sizes=\"auto, (max-width: 403px) 100vw, 403px\" \/><\/a><\/p>\n<p>Malwarebytes users running our <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/malwarebytes-browser-exte\/ihcjicgdanjaechkgeegckofjjedodee?hl=en\" target=\"_blank\" rel=\"noopener\">browser extension<\/a> are protected against the tech support scam pages without any need for signature updates.<\/p>\n<h3>Indicators of compromise<\/h3>\n<pre>137.74.150.112,examhome[.]net,Examhome Campaign (URI)  37.139.5.74,mp3menu[.]org,Examhome Campaign (URI)  23.163.0.39,ejyoklygase[.]tk,TK TSS Browlock (URI)    Injected blurb (partial):  String.fromCharCode(118, 97, 114, 32, 115, 111, 109    From Sucuri Labs:  ads.voipnewswire[.]net\/ad.js  cdn.allyouwant[.]online\/main.js?t=c<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/\">Mass WordPress compromises redirect to tech support scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 20 Sep 2018 17:42:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/' title='Mass WordPress compromises redirect to tech support scams'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/shutterstock_273441785.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Thousands of WordPress sites have been injected with the same malicious redirection. We review the infection details and the malicious traffic leading to browser lockers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin-code\/\" rel=\"tag\">Bitcoin Code<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/browlock\/\" rel=\"tag\">browlock<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/indicators-of-compromise\/\" rel=\"tag\">Indicators of compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/injections\/\" rel=\"tag\">injections<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/javascript\/\" rel=\"tag\">JavaScript<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wordpress\/\" rel=\"tag\">wordpress<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zues\/\" rel=\"tag\">Zues<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/' title='Mass WordPress compromises redirect to tech support scams'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mass-wordpress-compromises-tech-support-scams\/\">Mass WordPress compromises redirect to tech support scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10490,16702,17024,19506,19552,10871,10510,10577,10494,10545,16341,19553],"class_list":["post-13400","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bitcoin","tag-bitcoin-code","tag-browlock","tag-indicators-of-compromise","tag-injections","tag-javascript","tag-social-engineering","tag-tech-support-scams","tag-threat-analysis","tag-tss","tag-wordpress","tag-zues"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13400"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13400\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13400"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}