Yet another series of attacks – This time using

Update 1: It seems that this attack is limited to only Bluehost and Dreamhost, not GoDaddy like in the previous times.
Update 2: This script should fix/clean an infected site: site fix.php
Update 3: Attackers are using and as well.

We’re tracking another series of attacks affecting many web sites (WordPress seems to be the target application so far). This time they’re using as the attacking site and adding the following javascript to the web sites:

<script src=""></script>

<script src="

This code then loads another javascript from attempting to push the “Fake Anti virus” virus to the visitor of the site.

What is interesting is the people behind this attack. Do you remember the losotrana attack amongst the various others we’ve discussed in the past few months? Well, the people involved in this one are the same. Check out the WHOIS contact info for

Domain name:

Registrant Contact:
HardSoft, inc
Hilary Kneber
7569468 fax: 7569468
29/2 Sun street. Montey 29
Virginia NA 3947

It’s the same that registered, and others. We’re still researching the exploit vector, and we’ll post more details when we have them.

If you’re having difficulties getting your site cleaned up, send us an email to or visit our site: We can get your sites clean up right away.

  1. Magnitude and Method? Brute force on poorly secured individual blogs? Other? You know these scum bags target amateur web sites with zero security and exploitable holes all over the place these days. Easy way to make things go viral.

  2. This is the second time that some of my Bluehost sites have been hacked this way. What can I do to better secure my accounts or WordPress and other PHP based applications to prevent this in the future?

    1. My take is develop and maintain that backup plan. That's the best insurance you can provide yourself. In many cases the worst that can happen is you might have to go back on line with just a few days comments sacrificed. These attacks on hosts are a real pain. But since not a lot of people can afford dedicated server space with exceptional security in place and intrusion monitoring developing a regular backup plan is wise. Although I am not with Blue Host or Dream Host, from experience I learned this is the time to seriously pay attention, follow events and instructions, and try to remain cool. Your host may have to employ some "dramatic efforts" and counter measures for a bit to get things under control.

  3. Seems to have been added through some php code. Searched the files and found code with “eval(base64_decode(“Gd6ZGVjbTgxMjg4NUE1M0RB…” etc… greping all the files in the website yielded these files infected. Curious that none of those files/folders had write permissions. I wonder how they got the code into this wordpress install… dun dun dun.


Comments are closed.

You May Also Like