US-CERT is urging WordPress admins update the publishing software after a recent spike in infected WordPress sites that redirect visitors to a dangerous exploit kit known as Nuclear.
WordPress released version 4.4.2 on Tuesday to address flaws that left instances vulnerable to an “open redirection attack” bug and a “possible” Server Side Request Forgery (SSRF).
Open redirects are a lingering problem for web applications, and as the name suggests rely on exploiting a vulnerable web page to redirect a visitor to an malicious page. They’re often accompanied by a phishing attack, security firm Qualys recently explained.
WordPress remains one of the more popular publishing platforms on the web and installations have in the past been abused to spread malware, which is likely why US-CERT urged admins to upgrade as soon as possible to version 4.4.2.
Security firm Malwarebytes followed up that report noting that the infected WordPress sites were in fact redirecting visitors to pages hosting fraudulent ads that ultimately flicked them to a secondary site that hosted Nuclear— a nasty exploit that serves up a smorgasbord of threats, including the CryptoWall 4.0 file-encrypting malware.
“WordPress sites are injected with huge blurbs of rogue code that performs a silent redirection to domains appearing to be hosting ads. This is a distraction (and fraud) as the ad is stuffed with more code that sends visitors to the Nuclear Exploit Kit,” explained Jerome Segura, senior security researcher at Malwarebytes.
Denis Sinegubko, a senior malware researcher with Securi, said the malware only infected first time visitors to an infected site. Meanwhile, WordPress admins would have found that they’re web server will continuously be reinfected even after attempting to clean up the malware.
“It’s not enough to clean just one site (e.g. the one you care about) or all but one (e.g. you don’t care about a test or backup site) in such situations – an abandoned site will be the source of the reinfection. In other words, you either need to isolate every sites or clean/update/protect all of them at the same time,” he said.
In any case, if WordPress admins haven’t already updated their software, this attack should give them cause to do so.
Participate in CSO and Gigamon's survey on Security Priorities today!
Go into the draw for a chance to win an Apple iWatch Sports or the equivalent of $500 Visa Cashcard.
For full terms and conditions click here.