Magento Platform Targeted By Credit Card Scrapers

We’ve been writing a lot about E-Commerce hacks and PCI Compliance recently. The more people buy things online, the more of an issue this will be come and the more important it will be to talk about it. We live in an online world where a single mistake can lead to catastrophic results; that impact is amplified when we’re dealing with commerce.

visit Sucuri

Fake jQuery Scripts in Nulled WordPress Pugins

We recently investigated some random redirects on a WordPress website that would only happen to certain visitors. Traffic analysis showed us that it was not a server-side redirect, rather it happened due to some script loaded by the web pages. A quick look through the HTML code revealed this script: It was very suspicious for a few reasons: www .

visit Sucuri

WordPress JetPack and TwentyFifteen DOM-based XSS Vulnerability | Sucuri Blog

By on . Any WordPress Plugin or theme that leverages the genericons package is vulnerable to a DOM-based Cross-Site Scripting (XSS) vulnerability due to an insecure file included with genericons. So far, the JetPack plugin (reported to have over 1 million active installs) and the TwentyFifteen theme (installed by default) are found to be vulnerable.

visit Sucuri

Aviso de seguridad: Persistente XSS en WP-Super-cache

By on . Riesgo de Seguridad: Dangerous Nivel de Explotación: 8/10 Vulnerabilidad: Persistentes XSS Versión Parcheada: 1.4.4 Durante una auditoría de rutina de nuestro Sitio Web Firewall (WAF), descubrimos una peligrosa vulnerabilidad XSS persistente que afecta a la muy popular plugin WP-Super-caché (más de un millón de instalaciones activas según wordpress.org).

visit Sucuri

vBSEO’s Vulnerability Leads to Remote Code Execution

By on . We were notified last week that the vBulletin team sent an email to all their clients about a potential security vulnerability in vBSEO. After further investigation, we confirm that this is a very critical issue as it could allow an attacker to execute malicious PHP code on your website, manually patching this add-on should be done immediately.

visit Sucuri

SoakSoak: Payload Analysis – Evolution of Compromised Sites – IE 11

By on . Thousands of WordPress sites has been hit by the SoakSoak attack lately. At this moment we know quit a lot about it. It uses the RevSlider vulnerability as a point of penetration. Then uploads a backdoor and infects all websites that share the same server account (so sites that don’t use the RevSlider plugin can be infected too).

visit Sucuri

RevSlider Vulnerability Leads To Massive WordPress SoakSoak Compromise

By on . Yesterday we disclosed a large malware campaign targeting and compromising over 100,000 WordPress sites, and growing by the hour. It was named SoakSoak due to the first domain used in the malware redirection path (soaksoak.ru). After a bit more time investigating this issue, we were able to confirm that the attack vector is the RevSlider plugin.

visit Sucuri

SoakSoak Malware Compromises 100,000+ WordPress Websites

By on . This Sunday has started with a bang. Google has blacklisted over 11,000 domains with this latest malware campaign from SoakSoak.ru: Our analysis is showing impacts in the order of 100’s of thousands of WordPress specific websites. We cannot confirm the exact vector, but preliminary analysis is showing correlation with the Revslider vulnerability we reported a few months back.

visit Sucuri

Security advisory – High severity – InfiniteWP Client WordPress plugin

By on . Advisory for: InfiniteWP Client for WordPress Security Risk: High (DREAD score : 8/10) Exploitation level: Easy/Remote Vulnerability: Privilege escalation and potential Object Injection vulnerability. Patched Version: 1.3.8 If you’re using the InfiniteWP WordPress Client plugin to manage your website, now is a good time to update.

visit Sucuri

Most Common Attacks Affecting Today’s Websites

New web-based attack types and vectors are coming out every day, this is causing businesses, communities and individuals to take security seriously now more than they ever have in the past. This is a huge win for the World Wide Web and it’s a trend that is pushing technology further towards more robust and securely developed web applications.

visit Sucuri

Puertas Traseras ASP? ¡Claro! No se trata sólo de PHP

By on . He venido recientemente a la realizacion que podría parecer que estamos parciales a PHP y WordPress. Esta realizacion ha llevado a cabo una inmensa necesidad de corregir esa percepción. Mientras hacen un porcentaje interesante, hay varias otras plataformas y lenguajes que tienen similares si no más devastadoras consecuencias.

visit Sucuri

Consultoria de Segurança – Severidade Média – Plugin do WordPress WP eCommerce

By on . Consultoria para: Plugin do WordPress WP eCommerce Risco de Segurança: Média (DREAD score : 6/10) Nível de Exploração: Fácil/Remota Vulnerability: Vazamento de Informação e bypass do controle de acesso Versão Corrigida: 3.8.14.4 Se você estiver usando o famoso plugin do WordPress WP eCommerce (2,9 milhões de downloads), você deve atualizá-lo imediatamente.

visit Sucuri

Spotting Malicious Injections in Otherwise Benign Code

By on . Being able to spot suspicious code, and then determine whether it is benign or malicious is a very important skill for a security researcher. Every day we scan through megabytes of HTML, JS and PHP. It’s quite easy to miss something bad, especially when it doesn’t visually stick out and follows patterns of a legitimate code.

visit Sucuri

Asesor de Seguridad – Severidad Mediana – WP eCommerce Plugin de WordPress

By on . Asesor para: WordPress WP Plugin de comercio electrónico Riesgo de seguridad: Mediano (puntuación DREAD: 6/10) Nivel de explotación: Fácil / Remoto Vulnerabilidad: Información de fugas y de derivación de control de acceso. Versión parcheada: 3.8.14.4 Si usted está utilizando el popular plugin de WP de comercio electrónico de WordPress (2,900,000 descargas), usted debe actualizar de inmediato.

visit Sucuri

Security Advisory – Medium Severity – WP eCommerce WordPress Plugin

By on . Advisory for: WordPress WP eCommerce Plugin Security Risk: Medium (DREAD score : 6/10) Exploitation level: Easy/Remote Vulnerability: Information leak and access control bypass. Patched Version: 3.8.14.4 If you’re using the popular WP eCommerce WordPress plugin (2,900,000 downloads), you should update it right away.

visit Sucuri

ASP Backdoors? Sure! It’s not just about PHP

By on . I recently came to the realization that it might appear that we’re partial to PHP and WordPress. This realization has brought about an overwhelming need to correct that perception. While they do make up an interesting percentage, there are various other platforms and languages that have similar if not more devastating implications.

visit Sucuri

Website Attacks – SQL Injection And The Threat They Present

We are starting a new series of articles where we will talk about different active website attacks we are seeing. The first one we will cover is known as a SQL Injection (SQLi). Some might know what a SQL Injection (SQLi) attack looks like, but assuming you don’t, it’s an attack that leverages an injection technique to manipulate and / or further exploit your SQL based database.

visit Sucuri

Bash – ShellShocker – Attacks Increase in the Wild – Day 1

The Bash ShellShocker vulnerability was first disclosed to the public yesterday, 2014/Sep/24. Just a few hours after the initial release, we started to see a few scans looking for vulnerable servers. Our Website Firewall (CloudProxy) had already virtually patched the vulnerability via it’s Zero Day response mechanism.

visit Sucuri

Security Advisory – Hikashop Extension for Joomla!

By on . Advisory for: Hikashop for Joomla! Security Risk: High (DREAD score : 7/10) Vulnerability: Object Injection / Remote Code Execution Updated Version: 2.3.2 In a routine audit of our Website Firewall we discovered a serious vulnerability within the Hikashop ecommerce product for Joomla! allowing remote code execution on the vulnerable website[s].

visit Sucuri

Create a free website or blog at WordPress.com.

Up ↑

%d bloggers like this: