Thursday, January 21, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Malware creates scam online stores on top of hacked WordPress sites

November 24, 2020
in Internet Security
Malware creates scam online stores on top of hacked WordPress sites
588
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Image: ZDNet, WordPress

A new cybercrime gang has been seen taking over vulnerable WordPress sites to install hidden e-commerce stores with the purpose of hijacking the original site’s search engine ranking and reputation and promote online scams.

ZDNet Recommends


The best VPNs in 2020

You might also like

Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data

Best antivirus software in 2021

NSA urges system administrators to replace obsolete TLS protocols


The best VPNs in 2020

VPNs aren’t essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.

Read More

The attacks were discovered earlier this month targeting a WordPress honeypot set up and managed by Larry Cashdollar, a security researcher for the Akamai security team.

Also: The best web hosting providers: Find the right service for your site 

The attackers leveraged brute-force attacks to gain access to the site’s admin account, after which they overwrote the WordPress site’s main index file and appended malicious code.

While the code was heavily obfuscated, Cashdollar said the malware’s primary role was to act as a proxy and redirect all incoming traffic to a remote command-and-control (C&C) server managed by the hackers.

It was on this server where the entire “business logic” of the attacks took place. According to Cashdollar, a typical attack would go as follows:

  1. User visits hacked WordPress site.
  2. The hacked WordPress site redirects the user’s request to view the site to the malware’s C&C server.
  3. If a user meets certain criteria, the C&C server tells the site to reply with an HTML file containing an online store peddling a wide variety of mundane objects.
  4. The hacked site responds to the user’s request with a scammy online store instead of the original site the user wanted to view.
wp-seo-store-scheme.jpg

Image: Akamai

Cashdollar said that during the time the hackers had access to his honeypot, the attackers hosted more than 7,000 e-commerce stores that they intended to serve to incoming visitors.

Intruders poisoned the site’s XML sitemap

In addition, the Akamai researchers said the hackers also generated XML sitemaps for the hacked WordPress sites that contained entries for the fake online stores together with the site’s authentic pages.

The attackers generated the sitemaps, submitted them to Google’s search engine, and then deleted the sitemap to avoid detection.

While this procedure looked pretty harmless, it actually had a pretty big impact on the WordPress site because it ended up poisoning its keywords with unrelated and scammy entries that lowered the website’s search engine results page (SERP) ranking.

Cashdollar now believes that this kind of malware could be used for SEO extortion schemes — where criminal groups intentionally poison a site’s SERP ranking and then ask for a ransom to revert the effects.

“This makes them a low-barrier attack for criminals to pull off, as they only need a few compromised hosts to get started,” Cashdollar said. “Given that there are hundreds of thousands of abandoned WordPress installations online, and millions more with outdated plug-ins or weak credentials, the potential victim pool is massive.”

Credit: Zdnet

Previous Post

Data Science Central Weekly Digest, 23 Nov 2020

Next Post

Freshworks Taps AWS Machine Learning and Artificial Intelligence to Deliver Predictive Customer Support at Scale - CRN

Related Posts

Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data
Internet Security

Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data

January 21, 2021
Best antivirus software in 2021
Internet Security

Best antivirus software in 2021

January 21, 2021
NSA urges system administrators to replace obsolete TLS protocols
Internet Security

NSA urges system administrators to replace obsolete TLS protocols

January 21, 2021
Microsoft: How ‘zero trust’ can protect against sophisticated hacking attacks
Internet Security

Microsoft: How ‘zero trust’ can protect against sophisticated hacking attacks

January 21, 2021
Willyama’s role in helping Indigenous Australians secure a career in cybersecurity
Internet Security

Google: These new password protection features are coming to Chrome

January 20, 2021
Next Post
Amazon EC2 P4d instances for pushing machine learning boundaries now available

Freshworks Taps AWS Machine Learning and Artificial Intelligence to Deliver Predictive Customer Support at Scale - CRN

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data
Internet Security

Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data

January 21, 2021
Skyrim modders have a new machine learning tool that turns text to realistic NPC speech
Machine Learning

Skyrim modders have a new machine learning tool that turns text to realistic NPC speech

January 21, 2021
6 Major AI Use Cases In IT Operations | by Gina Shaw | Jan, 2021
Neural Networks

6 Major AI Use Cases In IT Operations | by Gina Shaw | Jan, 2021

January 21, 2021
Agile Marketing: 3 Tips for a Post-Pandemic Economy
Marketing Technology

Agile Marketing: 3 Tips for a Post-Pandemic Economy

January 21, 2021
Best antivirus software in 2021
Internet Security

Best antivirus software in 2021

January 21, 2021
The 37 Best Machine Learning Courses on Udemy to Consider
Machine Learning

The 37 Best Machine Learning Courses on Udemy to Consider

January 21, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Ransomware victims that have backups are paying ransoms to stop hackers leaking their stolen data January 21, 2021
  • Skyrim modders have a new machine learning tool that turns text to realistic NPC speech January 21, 2021
  • 6 Major AI Use Cases In IT Operations | by Gina Shaw | Jan, 2021 January 21, 2021
  • Agile Marketing: 3 Tips for a Post-Pandemic Economy January 21, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates