• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malware campaign exploits popup builder wordpress plugin to infect 3,900+

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

You are here: Home / General Cyber Security News / Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites
March 12, 2024

A new malware marketing campaign is leveraging a superior-severity security flaw in the Popup Builder plugin for WordPress to inject destructive JavaScript code.

According to Sucuri, the campaign has contaminated much more than 3,900 web pages about the previous three weeks.

“These attacks are orchestrated from domains much less than a month previous, with registrations courting back to February 12th, 2024,” security researcher Puja Srivastava said in a report dated March 7.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


An infection sequences require the exploitation of CVE-2023-6000, a security vulnerability in Popup Builder that could be exploited to build rogue admin customers and set up arbitrary plugins.

Cybersecurity

The shortcoming was exploited as aspect of a Balada Injector marketing campaign previously this January, compromising no fewer than 7,000 web sites.

The most up-to-date established of attacks guide to the injection of malicious code, which will come in two different variants and is built to redirect web site people to other internet sites such as phishing and fraud webpages.

WordPress web-site house owners are advisable to retain their plugins up-to-day as properly as scan their sites for any suspicious code or end users, and conduct suitable cleanup.

“This new malware marketing campaign serves as a stark reminder of the risks of not keeping your internet site software package patched and up-to-day,” Srivastava claimed.

The progress will come as WordPress security organization Wordfence disclosed a large-severity bug in one more plugin known as Supreme Member that can be weaponized to inject destructive web scripts.

The cross-website scripting (XSS) flaw, tracked as CVE-2024-2123 (CVSS rating: 7.2), impacts all variations of the plugin, such as and prior to 2.8.3. It has been patched in version 2.8.4, released on March 6, 2024.

The flaw stems from insufficient enter sanitization and output escaping, thereby making it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will be executed just about every time a user visits them.

“Blended with the point that the vulnerability can be exploited by attackers with no privileges on a susceptible site, this signifies that there is a superior prospect that unauthenticated attackers could get administrative user entry on web sites operating the susceptible variation of the plugin when efficiently exploited,” Wordfence mentioned.

Cybersecurity

It truly is worthy of noting that the plugin maintainers tackled a similar flaw (CVE-2024-1071, CVSS score: 9.8) in edition 2.8.3 introduced on February 19.

It also follows the discovery of an arbitrary file add vulnerability in the Avada WordPress topic (CVE-2024-1468, CVSS rating: 8.8) and perhaps executes destructive code remotely. It has been fixed in edition 7.11.5.

“This makes it achievable for authenticated attackers, with contributor-stage obtain and higher than, to upload arbitrary files on the impacted site’s server which could make remote code execution possible,” Wordfence stated.

Uncovered this report fascinating? Abide by us on Twitter  and LinkedIn to examine far more distinctive information we write-up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «south korean citizen detained in russia on cyber espionage charges South Korean Citizen Detained in Russia on Cyber Espionage Charges
Next Post: CTEM 101 – Go Beyond Vulnerability Management with Continuous Threat Exposure Management ctem 101 go beyond vulnerability management with continuous threat»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.