Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin.
Cybercriminals are always curious about developing the exploits soon after the new vulnerabilities found in wide particularly sites that running under WordPress.
Attackers are cleverly changing the new domains every week by slightly modifying the obfuscation of their malicious script and evade the detection from the security implementation.
Denis Sinegubko, a security researcher from Sucuri uncovered that the attackers initiate the malware campaign from following new domains which were created between 19-21 September.
There are different types of obfuscation methods used by attackers in the new wave of a malware campaign nad is using the code infection technique to implant the malicious script into the targeted websites.
Researchers have roughly collected nearly 89 sites with this buggy code indexed by PublicWWW.
New research found a malicious script from one of the infected websites has tried to exploit the Rich Reviews plugin.
According to Sucuri research” we find a more elaborate obfuscation method that uses random variable names and comments inside the character code array. “
Another obfuscation method, an injection script executes an XSS exploit code for logged in users that attempts to change the site URL and home options.
“These two types of obfuscation were clearly not enough for the bad actors, however. researchers also noticed a number of other obfuscation methods used in this new wave of campaign.”