The attack from the .cc’s domains

Over the last few days we’ve continued to see a large increase in the number of sites hacked and infected with a malicious iframe from (,, etc) domains.

You can run a free scan using SiteCheck to see if you’ve been infected.

That’s how it looks like on a hacked site:

<iframe src="" width=”1″ height=”1″>


<iframe src="" width=’1` height=`1″>

The number of domains being used in this attack is quite big and only a few of them are blacklisted by Google, but we already identified those at least:

They change quite often, but on a hacked site, the sign is the same: Redirecting to .cc malicious sites and the following PHP code added to the index.php (among with other backdoors):

<?php eval ( base64_decode("ZXJyb3JfcmV.wb3J0aW5nKDApOw0KJGJv.dCA9IEZBTFNFIDsNC…

The decoded malware is available here:

Here’s our malware definition for it:

Cleaning up:

Cleaning up is not very hard, you have to remove the malicious code above from your index.php files, upgrade WordPress (Joomla, osCommerce or whatever web application you are using), change all the passwords and check for backdoors (files that you didn’t add). If you need help doing that (or need someone to do it for you), we offer web site malware removal / clean up services

We will post more details /updates as we learn more.

Scan your website for free:
About David Dede

David Dede is a Security Researcher in the SucuriLabs group. He spends most of his time dissecting vulnerabilities and security issues. You won't find him on Twitter because he is paranoid about privacy.