Tuesday, March 19, 2024

Hackers Using WordPress and Joomla Sites to Distribute Shade Ransomware

CMS based sites such as WordPress and Joomla are the popular targets for cybercriminals, they hijack those sites and inject malicious contents.

ThreatLabZ researchers detected a campaign that targets WordPress and Joomla sites to distribute Shade/Troldesh ransomware, backdoors, redirectors, and a variety of phishing pages.

Hackers use to hijack several hundreds of CMS sites and inject the Troldesh ransomware and phishing pages. All the compromised websites using WordPress versions between 4.8.9 to 5.1.1 and they SSL issued through Automatic Certificate Management Environment such as Let’s Encrypt, Cpanel and others.

According to zscaler, among the compromised sites, 13.6 percent contains Shade ransomware, 27.6 percent contains phishing pages and rest of the sites contains coinminers, adware, and malicious redirectors.

Attackers favoring the .well-know hidden directory for storing and distributing ransomware. The hidden .well-know directory is created by the site administratory to verify the ownership of the domain.

Shade Ransomware Infection

Shade ransomware infected sites contain HTML, ZIP, and EXE (.jpg) files, the HTML files are to redirect the users in downloading the zip file, the zip file contains highly obfuscated that downloads payload to Temp location.

The downloaded payload is the Shade/Troldesh ransomware that encrypts all the users file with AES-256 and appends a filename(.ID_of_infected_machine.crypted000007).

“It drops README1.txt to README10.txt on the desktop and changes the wallpaper as shown below”, reads ZScaller blog post.

Phishing pages

Phishing pages also stored in the hidden directories to hide them from website administrators and to increase in the life of the phishing page in the compromised site.

The phishing pages are related to Office 365, Microsoft, DHL, Dropbox, Bank of America, Yahoo, Gmail, and others.

Last week researches discovered a Stored XSS Vulnerability in social sharing plug-in called “Social Warfare” which allows attackers to take over the vulnerable WordPress websites.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Website

Latest articles

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...

New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data

In recent years, personal data security has surged in importance due to digital device...

Discontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks

A critical vulnerability was discovered in two plugins developed by miniOrange.The affected plugins,...

ShadowSyndicate Hackers Exploiting Aiohttp Vulnerability To Access Sensitive Data

A new Aiohttp vulnerability has been discovered, which the threat actor ShadowSyndicate exploits.Aiohttp...

Hackers Launching AI-Powered Cyber Attacks to Steal Billions

INTERPOL's latest assessment on global financial fraud uncovers the sophisticated evolution of cybercrime, fueled...

Fujitsu Hacked – Attackers Infected The Company Computers with Malware

Fujitsu Limited announced the discovery of malware on several of its operational computers, raising...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles