Thursday, January 30, 2025
HomeMalwareOver 700 WordPress and Joomla Websites Infected with IonCube Malware

Over 700 WordPress and Joomla Websites Infected with IonCube Malware

Published on

SIEM as a Service

Follow Us on Google News

New Ioncube Malware found on hundreds of WordPress and Joomla websites that infect with legitimate Ioncube encoded files.

IonCube is a PHP Encoder that used for Encrypt and protect files with PHP encoding, encryption, obfuscation and licensing capabilities.

This Malware infection discovered in both WordPress and Joomla websites along with thousands of files and it infect the files such as “diff98.php” and “wrgcduzk.php” which is core directories of a WordPress site.

IonCube malware is used by hackers to create backdoor on vulnerable websites allowing them to steal data from the Victims.

Also Read: Penetration testing with your WordPress Website-Detailed Explanation

IonCube Malware with WordPress and Joomla 

Initially researchers discovered IonCube Malware WordPress site files that encoded with ionCube, which is one of the oldest and most difficult to reverse PHP obfuscation technologies.

Later further analysis revealed that, it infected Joomla and CodeIgniter sites and this malware visible in almost  any web server running PHP.

So Over all, researchers found over 700 infected sites, totalling over 7,000 infected files.

According to sitelock It was also found that the files were not consistently following malicious naming patterns – innocuous files with names such as “inc.php” and “menu.php” also contained this malware.

Fake IonCube files completely pretending as legitimate IonCube files.

Fake ionCube File

Legitimate ionCube File

In this case, Few line exists in the legitimate ionCube file, but not the fake one, and should be present in all recent, legitimate ionCube files.

Every Legitimate Ioncube files reference to the ioncube.com domain but it is not present in the fake files.

“Also researchers notice that the fake file has a code block after the PHP closing tags, much like the legitimate ionCube file. But unlike the real file, this code block consists only of alphanumeric characters and newlines.”

Mitigation by SiteLock

If you or your developer have not specifically and intentionally installed ionCube-encoded files, it is likely that any files claiming to be using ionCube are suspicious, as successfully making use of ionCube typically requires manual server configuration.

Also, cross-compatibility with different versions of PHP is minimal, reducing the viability of use as malware.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...