- The hacking campaign makes use of previously known vulnerabilities in WordPress plugins.
- Some of the vulnerable plugins exploited include the ‘CP Contact Form with PayPal’ and the ‘Simple Fields’.
More than 2000 WordPress sites have been hacked by cybercriminals for a scam campaign that redirects visitors to several scam sites.
What does the report say?
Discovered by researchers from Sucuri, the hacking campaign makes use of previously known vulnerabilities in WordPress plugins. Some of the vulnerable plugins exploited include the ‘CP Contact Form with PayPal’ and the ‘Simple Fields’.
- When a visitor accesses the hacked site, the injected script will attempt to /wp-admin/options-general.php and the /wp-admin/theme-editor.php administrative URLs in the background. These URLs are further abused to inject scripts or change WordPress settings to redirect visitors to various scam pages containing unwanted browser notification subscriptions, fake surveys, giveaways, and fake Adobe Flash downloads.
- However, in order to inject scripts, these URLs require administrative access.
- Once a user subscribes to the notifications by clicking on the ‘Allow’ button, they would be redirected to other scam sites.
Website owners are urged to disable the modification of primary folders to block hackers from inserting malicious files. Meanwhile, experts claim that attackers will continue to register new domains or leverage existing unused domains to conduct such scam campaigns in the future.