Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hackers Compromised 3,300 Websites using Plug-in Vulnerability

admin by admin
Mar 12, 2024
in News
A A
0

Attackers exploit an unpatched Popup Builder vulnerability (CVE-2023-6000) to inject malicious code into vulnerable websites’ “Custom JS or CSS” sections. 

The code redirects users to phishing sites or injects further malware, and the campaign has already infected over 3300 websites.

Malicious code targets popup events (opening and closing) to manipulate popup behavior. Sometimes, attackers redirect contact forms (potentially “contact-form-7”) to a malicious URL. Security scanners can identify these injections.

According to Sucuri, patch Popup Builder to version 4.2.7 to mitigate the attack, whereas web application firewalls offer temporary protection. 

After removing the malicious code, thoroughly scan the website to identify and remove backdoors. 

Eliminate any unfamiliar administrator accounts, and most importantly, keep all website software updated to prevent similar attacks.

Malicious Code Detection Indicators

In order to inject malicious code hidden inside the Custom JS or CSS parts of the WordPress admin interface and stored in the database, attackers used a vulnerability in the Popup Builder WordPress plugin.

“These injections serve as handlers for various Popup Builder events such as sgpb-ShouldOpen, sgpb-ShouldClose, sgpb-WillOpen, sgpbDidOpen, sgpbWillClose, sgpb-DidClose. The events fire at different stages of the legitimate site’s popup display process.”

The two variations of the malicious code that can be found in the database of infected websites are:

The injected code targets events triggered throughout a popup’s life cycle, such as opening, closing, and visibility changes. These events (sgpb-ShouldOpen, sgpb-WillOpen, etc.) allow attackers to manipulate the popup’s behavior.

In some cases, the attackers redirect contact forms (possibly built with “contact-form-7”) to a malicious URL (“hxxp://ttincoming.traveltraffic[.]cc/?traffic”). Security scanners like SiteCheck identify these injections as “malware?pbuilder_injection.1.x.”.

Mitigation Steps and Malware Removal

A new malware campaign targets outdated Popup Builder plugins (versions below 4.2.3), exploiting a known XSS vulnerability (CVE-2023-6000). 

The malware injects malicious code into the plugin’s “Custom JS or CSS” section. This code can redirect visitors to phishing sites or inject further malware.

Patching the plugin to version 4.2.7 or later is crucial. Web application firewalls can also provide temporary protection. After removing the malicious code from the “Custom JS or CSS” section, a thorough website scan is necessary to identify and remove any backdoors created by the malware. 

Additionally, website administrators should eliminate any unfamiliar accounts. Finally, updating all website software with the latest security patches is essential to preventing similar attacks.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.