{"id":12892,"date":"2023-01-05T05:35:16","date_gmt":"2023-01-05T10:35:16","guid":{"rendered":"http:\/\/local.brightwhiz\/?p=12892"},"modified":"2023-01-12T05:40:45","modified_gmt":"2023-01-12T10:40:45","slug":"linux-malware-targets-wordpress-websites","status":"publish","type":"post","link":"http:\/\/local.brightwhiz\/linux-malware-targets-wordpress-websites\/","title":{"rendered":"Linux Malware Targets WordPress Websites"},"content":{"rendered":"\n

Linux malware targets WordPress websites by exploiting 30 vulnerabilities found in a variety of themes.<\/p>\n\n\n\n

Researchers have warned users of a new Linux malware that targets WordPress websites with malicious JavaScript. The malware is actively targeting WordPress websites. It is identified as Linux.BackDoor.WordPressExploit.1 and targets both 32-bit and 64-bit Linux<\/a> versions.<\/p>\n\n\n\n

The malware is not peculiar in that it the malware basically serves as a backdoor for the attackers to gain access to the target sites. This is done by exploiting 30 vulnerabilities across various WordPress plugins and themes.<\/p>\n\n\n\n

The malware works by exploiting vulnerabilities in the unpatched plugins. The malware then allows the attacker to inject the target site with malicious JavaScript<\/a> codes.<\/p>\n\n\n\n

These malicious scripts would then redirect website users to the attackers’ sites to execute phishing attacks. The malware can also be paused by the attackers who can set it to standby mode or even shut down.<\/p>\n\n\n\n

Websites running unpatched versions of these plugins are at risk:<\/p>\n\n\n\n