Skip links

Yet another series of attacks – This time using

Update 1: It seems that this attack is limited to only Bluehost and Dreamhost, not GoDaddy like in the previous times.
Update 2: This script should fix/clean an infected site: site fix.php
Update 3: Attackers are using and as well.

We’re tracking another series of attacks affecting many web sites (WordPress seems to be the target application so far). This time they’re using as the attacking site and adding the following javascript to the web sites:

<script src=""></script>

<script src="

This code then loads another javascript from attempting to push the “Fake Anti virus” virus to the visitor of the site.

What is interesting is the people behind this attack. Do you remember the losotrana attack amongst the various others we’ve discussed in the past few months? Well, the people involved in this one are the same. Check out the WHOIS contact info for

Domain name:

Registrant Contact:
HardSoft, inc
Hilary Kneber
7569468 fax: 7569468
29/2 Sun street. Montey 29
Virginia NA 3947

It’s the same that registered, and others. We’re still researching the exploit vector, and we’ll post more details when we have them.

If you’re having difficulties getting your site cleaned up, send us an email to or visit our site: We can get your sites clean up right away.

  • Pingback: Tweets that mention Yet another series of attacks – This time using | Sucuri --

  • Sash

    Magnitude and Method? Brute force on poorly secured individual blogs? Other? You know these scum bags target amateur web sites with zero security and exploitable holes all over the place these days. Easy way to make things go viral.

  • Tony

    Got hacked can't wait for the fix !

  • Tony

    Please find a fix!

  • Jeanne

    This is the second time that some of my Bluehost sites have been hacked this way. What can I do to better secure my accounts or WordPress and other PHP based applications to prevent this in the future?

    • Sash

      My take is develop and maintain that backup plan. That's the best insurance you can provide yourself. In many cases the worst that can happen is you might have to go back on line with just a few days comments sacrificed. These attacks on hosts are a real pain. But since not a lot of people can afford dedicated server space with exceptional security in place and intrusion monitoring developing a regular backup plan is wise. Although I am not with Blue Host or Dream Host, from experience I learned this is the time to seriously pay attention, follow events and instructions, and try to remain cool. Your host may have to employ some "dramatic efforts" and counter measures for a bit to get things under control.

  • Pingback: Sites Wordpress estão vulneráveis a ataques de injeção de código | keepgeek()

  • Jasmine

    The site-fix.php didn't work for me. Is there another fix out there yet?

  • Pingback: Hilary Kneber (part XI) – | Sucuri()

  • Pingback: New, Malicious JavaScript Attack Discovered At Dreamhost, Bluehost()

  • Ipwtech

    Seems to have been added through some php code. Searched the files and found code with “eval(base64_decode(“Gd6ZGVjbTgxMjg4NUE1M0RB…” etc… greping all the files in the website yielded these files infected. Curious that none of those files/folders had write permissions. I wonder how they got the code into this wordpress install… dun dun dun.


  • Pingback: JavaScript Threats Rise; Popular NoScript Firefox Extension Wins | Blogging, WordPress, Social Media, Web Publishing - WordCast()

  • Pingback: Yet another series of attacks – This time using | Sucuri | Best Business Web Hosting()