WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

This image is about WordPress sites hacked with fake Cloudflare DDoS alerts.

DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of Service (DDoS) attack or other unwanted bot.

Bad bots make up a large portion of web traffic. These include DDoS traffic, scrapers scavenging email addresses to send spam, bots trying to find vulnerable websites to be compromised, and more.

Bots also consume bandwidth on websites, causing increased hosting costs and corrupting meaningful website visitor statistics.

Recently, a malicious JavaScript injection was discovered by Sucuri affecting WordPress websites, resulting in a fake CloudFlare DDoS protection popup.

Such browser controls are common on the web. For this reason, users can click on this request without thinking twice. This prompt actually downloads a malicious .iso file to the victim’s computer.

Next comes a new message asking for a verification code to access the website. This message is to persuade the user to open the file.

“This is NetSupport RAT. It has been linked to FakeUpdates/SocGholish and typically used to check victims before ransomware rollout. The ISO file contains a shortcut disguised as an executable that runs powershell from another text file.” Jerome Segura said.

“After that, just about anything can happen depending on the victim.”

The infected computer can be used to steal social media or banking credentials, detonate ransomware, and even imprison the victim in a malicious slave network, extort the computer owner and breach their privacy.

Not only SEO rankings or website reputations are important, but also the privacy and security of users visiting your website.

“Remote Access Trojans (RAT) are considered one of the worst types of infections that can infect a computer, as they give attackers full control over the device,” sucuri said in the report.

Here are some steps Sucuri recommends to reduce the risks:

Website owners:
  •     Keep all software on your website up to date
  •     Use strong passwords
  •     Use 2FA on your administrative panel
  •     Place your website behind a firewall service
  •     Employ file integrity monitoring
Website visitors:
  •     Make sure your computer is running a robust antivirus program
  •     Place 2FA on all important logins (such as your bank, social media)
  •     Practice good browsing habits; don’t open strange files!
  •     Keep your browser and all software on your computer updated/patched
  •     Use a script blocker in your browser (advanced)

 

References:

https://blog.sucuri.net/2022/08/fake-ddos-pages-on-wordpress-lead-to-drive-by-downloads.html

More posts

This image is about monthly vulnerabilities for September 2024.
This image is about the ServiceNow data leak.
This image is about monthly vulnerabilities for July 2024.
This image is about cyber strategies for the Paris Olympics 2024.
This image is about Russian influence operations targeting the Paris Olympics 2024.
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts