- Apr 17, 2011
- 2,503
Hackers are compromising WordPress 3.2.1 blogs in order to infect their visitors with the notorious TDSS rootkit, according to researchers from Web security firm Websense.
It's not clear how the websites are being compromised, but there are publicly known exploits for vulnerabilities that affect WordPress 3.2.1, which is an older version of the popular blog publishing platform.
Once they gain unauthorized access to a blog, the attackers inject malicious JavaScript code into its pages in order to load a Java exploit from a third-party server.
"From our analysis the number of infections is growing steadily (100+)," said Websense principal security researcher Stephan Chenette in a blog post on Monday. The company's research into this mass code injection campaign indicates that whoever is behind it is experienced.
The Java vulnerability exploited in the attack is known as CVE-2011-3544 and allows the remote execution of arbitrary code. In this case, the attackers are leveraging it to install a version of the TDSS rootkit on the computers of people visiting the website.
Read more...
---
In my own findings I went ahead and tried to test this exploit. I downloaded the said Java version mentioned in the vulnerability report here.
You can watch my video here. The malicious site that was serving the exploit returns 404. A disappointment as I was wanting to get my hands on this Rootkit for the Malware Hub
Maybe it's being served elsewhere on a new domain and other member could find the sample and perhaps share in the Malware Hub.
Cheers.