We are getting lots of questions about the latest mass compromise targeting WordPress sites (redirecting to fake AV) that has affected over 30,000 domains.
The first question is how are these sites getting hacked? On all the cases we analysed, they either had outdated versions of WordPress, or of a plugin. We can safely rule out any new vulnerability on WordPress itself.
We also posted about it a week ago when we detected this malware campaign using .rr.nu domains.
As we promised in the previous post, this is an update to what we are seeing.
- The malicious domains are still pointing to 220.127.116.11 and 18.104.22.168 (same IP’s used by the group behind the sweepstakesandcontestsdo.com and infoitpoweringgathering.com attacks)
- More than 200 different .rr.nu domains are being used
- We have identified more than 500 variations of the injected URL to random domains names in the .rr.nu TLD:
If you’re not sure if you’re infected, do a free website malware scan using SiteCheck