TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WordPress sites under attack from newly found Linux trojan

113 pointsby TT482over 2 years ago

14 comments

sschuellerover 2 years ago
I don&#x27;t think linux has anything to do with it. It injects JS code into an existing wordpress site to redirect visitors to spam&#x2F;scam etc. Any plugin that is allowed to write to disk and has a vulnerability is a problem.<p>&quot;Linux.Backdoor.WordPressExploit.1 is a trojan application for 32-bit and 64-bit Linux operating systems that targets x86-compatible devices. The backdoor is written in the Go (Golang) programming language and executes attackers’ commands. Its main functionality is to attack websites based on the WordPress CMS by exploiting vulnerabilities in outdated versions of plugins and themes for this platform. If an attack is successful, the webpages of such sites are injected with a malicious JavaScript that redirects website visitors to other sites.&quot;<p><a href="https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604695" rel="nofollow">https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604695</a><p>&quot;Linux.Backdoor.WordPressExploit.2 is a trojan application for 32-bit and 64-bit Linux operating systems that targets x86-compatible devices. The backdoor is written in the Go (Golang) programming language and executes attackers’ commands. Its main functionality is to attack websites based on the WordPress CMS by exploiting vulnerabilities in outdated versions of plugins and themes for this platform. If an attack is successful, the webpages of such sites are injected with a malicious JavaScript that redirects website visitors to other sites. This backdoor is a modification of the Linux.Backdoor.WordPressExploit.1 malicious application. It differs from it in the address of the C&amp;C server, the address of the domain from which the malicious script is downloaded, and its additional list of vulnerabilities to exploit.&quot;<p><a href="https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604745" rel="nofollow">https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604745</a>
评论 #34249173 未加载
评论 #34248705 未加载
评论 #34250146 未加载
评论 #34252748 未加载
评论 #34248632 未加载
评论 #34249965 未加载
bilekasover 2 years ago
This article is written so badly.. I suspect it could be a ChatGPT or some variant..<p>&gt; which targets 32-bit versions of Linux and also can run on 64-bit versions of the platform.<p>I don&#x27;t fully understand what they mean by this..<p>&gt; Vulnerabilities are not uncommon.<p>Pointing out the obvious here. But in general Wordpress has a high surface area of attack sure, but it allows bad &#x27;developers&#x27; to publish websites which are connected to sensitive services all without needing even the first comprehension of security. This is its worst feature.
评论 #34248132 未加载
评论 #34248393 未加载
评论 #34252283 未加载
评论 #34249685 未加载
remramover 2 years ago
More like &quot;Linux systems under attack from newly-found WordPress trojan&quot;
this_steve_jover 2 years ago
There is a nice writeup about the exploit which includes more information about the indicators of compromise (IOCs) on the (drweb) site:<p><a href="https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604695" rel="nofollow">https:&#x2F;&#x2F;vms.drweb.com&#x2F;virus&#x2F;?i=25604695</a><p>For example, the binary file has a SHA1 of 215a4470063080696630fb6015378938e8c16a15. It reaches out to a C2 server with the IP address 109[.]234.38[.]69. It injects a script called &quot;lone.js&quot; which contacts another server. Etc.<p>Someone has also submitted it to Virustotal very recently, and there is additional information available to explore. <a href="https:&#x2F;&#x2F;www.virustotal.com&#x2F;gui&#x2F;file&#x2F;7ab779b39a7ff2a8e4e4957e91be885e3b193959ff19f7d57f7befd8e6ce39b4" rel="nofollow">https:&#x2F;&#x2F;www.virustotal.com&#x2F;gui&#x2F;file&#x2F;7ab779b39a7ff2a8e4e4957e...</a><p>Yara is among the tools which can be used to search a system for these IOCs provided a set of rules written in the appropriate syntax.
评论 #34249990 未加载
sourcecodeplzover 2 years ago
Wordpress is great for rapid prototyping but as history has shown, relying on third parties for additional functionalities in production environments, comes with great risks.<p>Most usage of Wordpress today are definably not blogs, but full blown websites with many functionalities not found on a blogging software.
评论 #34247603 未加载
评论 #34247523 未加载
评论 #34250301 未加载
mort96over 2 years ago
I&#x27;m not understanding how this is a trojan. Is it a plug-in which the admin has to install? Is it some other unrelated application which the admin has to download from the web and run which infects WordPress sites? How do the 30 vulnerabilities fit into this?<p>And what part of it is a backdoor? It looks like the C&amp;C server can only tell the software what page to redirect to? That&#x27;s not the sort of access I generally associate with a &quot;backdoor&quot;...
kitsunesobaover 2 years ago
After my experience running a WordPress blog back in the mid-late 2000s, I swore off of it. Even with the meager traffic I got I saw a constant barrage of linkfarm exploits and the like that occurred with even the most brief lapses in keeping WP up to date.<p>Haven&#x27;t had a blog in about a decade, but when I spin one back up it&#x27;ll be with a static generator like Zola[0] running on a provider like Netlify[1]. Comments are nice to have but not worth the hassle that comes with a dynamic app or the moderation overhead required to keep comment spam at bay.<p>[0]: <a href="https:&#x2F;&#x2F;www.getzola.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.getzola.org&#x2F;</a> [1]: <a href="https:&#x2F;&#x2F;www.netlify.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.netlify.com&#x2F;</a>
评论 #34250066 未加载
porkerover 2 years ago
In the &quot;network indicators of an attack&quot; [1] what&#x27;s the significance of some periods being in square brackets and others not?<p>1. <a href="https:&#x2F;&#x2F;github.com&#x2F;DoctorWebLtd&#x2F;malware-iocs&#x2F;tree&#x2F;master&#x2F;Linux.Backdoor.WordPressExploit.1#network-indicators">https:&#x2F;&#x2F;github.com&#x2F;DoctorWebLtd&#x2F;malware-iocs&#x2F;tree&#x2F;master&#x2F;Lin...</a>
评论 #34247643 未加载
评论 #34250244 未加载
forgotpwd16over 2 years ago
That&#x27;s one shitty title.
jollyllamaover 2 years ago
Is there any good literature discussing the rise of server malware? It seems to me it&#x27;s much more common now and PC malware (regardless of OS) is more rare.
Neil44over 2 years ago
&quot;targets 32-bit versions of Linux and also can run on 64-bit versions of the platform.&quot;<p>That narrows it down then.
评论 #34247945 未加载
评论 #34246608 未加载
mdrznover 2 years ago
Website loads as a white page to me.<p>Even the Google-cached version.
评论 #34247841 未加载
评论 #34246783 未加载
评论 #34246789 未加载
评论 #34248778 未加载
评论 #34247219 未加载
评论 #34246678 未加载
fortran77over 2 years ago
Why does all this open source stuff have so many problems? Aren’t there a lot of eyes looking at the code?
评论 #34248754 未加载
评论 #34248655 未加载
评论 #34250625 未加载
habiburover 2 years ago
answers, &quot;why you should write your own framework, if you have the knowledge and time.&quot;
评论 #34246813 未加载
评论 #34248805 未加载
评论 #34246855 未加载