Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Backdoored CMS Plugins Used to Hijack Web Servers

Malicious CMS Plugins Used to Hijack Web Servers For Black Hat SEO

Thousands of backdoored plugins and themes for popular content management systems (CMS) are being leveraged by a threat group to abuse Web servers on a large scale.

Malicious CMS Plugins Used to Hijack Web Servers For Black Hat SEO

Thousands of backdoored plugins and themes for popular content management systems (CMS) are being leveraged by a threat group to abuse Web servers on a large scale.

The Netherlands-based security firm Fox-IT has published a whitepaper detailing the threat dubbed “CryptoPHP.” Researchers have uncovered malicious themes and plugins for WordPress, Drupal and Joomla. In the case of Drupal, only themes have been found to contain the CryptoPHP backdoor.

The attackers often trick website administrators into installing the backdoor by offering them pirated versions of premium themes and plugins. The malicious software is being distributed via various themes and plugins websites, such as Daily Nulled or Nulled Style. Fox-IT estimates that thousands of websites are affected.

Once it’s installed on a Web server, the malware can be controlled by cybercriminals manually, or through command and control (C&C) and email communications.

According to Fox-IT, cybercriminals have been using the backdoor for black hat search engine optimization (SEO). CryptoPHP injects links and text into webpages hosted on the compromised server to generate backlinks.

The attackers have taken measures to ensure that their operation cannot be detected or disrupted easily. They are using public key encryption for communications between the compromised server and the C&C, and they are relying on numerous C&C domains and IP addresses (191 unique domains and 45 unique IPs). The email communications feature is a backup mechanism for the eventuality that their C&C domains are shut down.

A majority of the C&C servers used by the threat are located in the Netherlands (40%), Germany (40%), and the United States (18%).

The first version of CryptoPHP was launched on September 25, 2013. A total of 16 variants have been released since then, with the latest (version 1.0a) going live on November 12, 2014. Evidence uncovered by researchers suggests that the author of the backdoor could be located in Moldova.

The presence of the backdoor is indicated by the following PHP snippet in one of the theme/plugin component files, depending on the CMS that’s targeted: <?php include(‘images/social.png’); ?>. Additional indicators of compromise (IOC) are available in the whitepaperpublished by Fox-IT.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

Application Security

A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...