Global CyberSecurity

Multistage WordPress Redirect Kit

0

Recently, one of our analysts @kpetku came across a series of semi-randomised malware injections in multiple WordPress environments. Typical of spam redirect infections, the malware redirects visitors by calling malicious files hosted on third party infected websites.

Interestingly, the infection stores itself as encoded content in the database and is called through random functions littered throughout plugin files using a very common wordpress function “get_option”. In this post we will review this infection and its characteristics.

Continue reading Multistage WordPress Redirect Kit at Sucuri Blog.

Navantia begins the sea trials of the 1st Al Jubail class corvette for the Royal Saudi Navy

Previous article

GE Renews Customized Service Agreement with Royal Canadian Navy for LM2500 Gas Turbines

Next article

You may also like

Comments

Comments are closed.